<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 04:20:33 +0000</lastBuildDate>
    <item>
      <title>1b4a3bac-9164-41bd-a520-3d47cc06b43c</title>
      <link>https://db.gcve.eu/sighting/1b4a3bac-9164-41bd-a520-3d47cc06b43c/export</link>
      <description>{"uuid": "1b4a3bac-9164-41bd-a520-3d47cc06b43c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "seen", "source": "https://t.me/cibsecurity/24009", "content": "\u203c CVE-2021-20226 \u203c\n\nA use-after-free flaw was found in the io_uring in Linux kernel, where a local attacker with a user privilege could cause a denial of service problem on the system The issue results from the lack of validating the existence of an object prior to performing operations on the object by not incrementing the file reference counter while in use. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-23T20:35:25.000000Z"}</description>
      <content:encoded>{"uuid": "1b4a3bac-9164-41bd-a520-3d47cc06b43c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "seen", "source": "https://t.me/cibsecurity/24009", "content": "\u203c CVE-2021-20226 \u203c\n\nA use-after-free flaw was found in the io_uring in Linux kernel, where a local attacker with a user privilege could cause a denial of service problem on the system The issue results from the lack of validating the existence of an object prior to performing operations on the object by not incrementing the file reference counter while in use. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-23T20:35:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1b4a3bac-9164-41bd-a520-3d47cc06b43c/export</guid>
      <pubDate>Tue, 23 Feb 2021 20:35:25 +0000</pubDate>
    </item>
    <item>
      <title>38411d3a-8fd6-46df-a9d0-ed588ba18dd7</title>
      <link>https://db.gcve.eu/sighting/38411d3a-8fd6-46df-a9d0-ed588ba18dd7/export</link>
      <description>{"uuid": "38411d3a-8fd6-46df-a9d0-ed588ba18dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/2591", "content": "\u041d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u043e\u043d\u044f\u0442\u043d\u043e, \u043d\u043e \u043e\u0447\u0435\u043d\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e.\n\n&amp;gt; If that name sounds familiar at all, Ryota also competed in the most recent Pwn2Own and won $30,000 demonstrating a different privilege escalation bug on Ubuntu.\n\nCVE-2021-20226: A REFERENCE-COUNTING BUG IN THE LINUX KERNEL IO_URING SUBSYSTEM\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-22T21:06:12.000000Z"}</description>
      <content:encoded>{"uuid": "38411d3a-8fd6-46df-a9d0-ed588ba18dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/2591", "content": "\u041d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u043e\u043d\u044f\u0442\u043d\u043e, \u043d\u043e \u043e\u0447\u0435\u043d\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e.\n\n&amp;gt; If that name sounds familiar at all, Ryota also competed in the most recent Pwn2Own and won $30,000 demonstrating a different privilege escalation bug on Ubuntu.\n\nCVE-2021-20226: A REFERENCE-COUNTING BUG IN THE LINUX KERNEL IO_URING SUBSYSTEM\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-22T21:06:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/38411d3a-8fd6-46df-a9d0-ed588ba18dd7/export</guid>
      <pubDate>Thu, 22 Apr 2021 21:06:12 +0000</pubDate>
    </item>
    <item>
      <title>916785a6-87eb-4834-acf9-bfa9f35aa217</title>
      <link>https://db.gcve.eu/sighting/916785a6-87eb-4834-acf9-bfa9f35aa217/export</link>
      <description>{"uuid": "916785a6-87eb-4834-acf9-bfa9f35aa217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/cKure/5026", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 A Reference-Counting Bug in the Linux Kernel io_uring Subsystem (PoC for CVE-2021-20226)\n\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-23T06:47:25.000000Z"}</description>
      <content:encoded>{"uuid": "916785a6-87eb-4834-acf9-bfa9f35aa217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/cKure/5026", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 A Reference-Counting Bug in the Linux Kernel io_uring Subsystem (PoC for CVE-2021-20226)\n\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-23T06:47:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/916785a6-87eb-4834-acf9-bfa9f35aa217/export</guid>
      <pubDate>Fri, 23 Apr 2021 06:47:25 +0000</pubDate>
    </item>
    <item>
      <title>93f36259-8785-4f94-99c8-ecd46498e22c</title>
      <link>https://db.gcve.eu/sighting/93f36259-8785-4f94-99c8-ecd46498e22c/export</link>
      <description>{"uuid": "93f36259-8785-4f94-99c8-ecd46498e22c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3195", "content": "A Reference-Counting Bug in the Linux Kernel io_uring Subsystem (PoC for CVE-2021-20226)\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-23T12:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "93f36259-8785-4f94-99c8-ecd46498e22c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3195", "content": "A Reference-Counting Bug in the Linux Kernel io_uring Subsystem (PoC for CVE-2021-20226)\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-23T12:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/93f36259-8785-4f94-99c8-ecd46498e22c/export</guid>
      <pubDate>Fri, 23 Apr 2021 12:03:01 +0000</pubDate>
    </item>
    <item>
      <title>1083b8cf-66f9-47f3-ace7-e26e51790588</title>
      <link>https://db.gcve.eu/sighting/1083b8cf-66f9-47f3-ace7-e26e51790588/export</link>
      <description>{"uuid": "1083b8cf-66f9-47f3-ace7-e26e51790588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/91", "content": "CVE-2021\u201320226: a reference counting bug which leads to local privilege escalation in io_uring\n\nAn article describing a bug in the io_uring subsystem. Improper handling of files_struct references leading to a use-after-free.\n\nhttps://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a", "creation_timestamp": "2021-06-21T19:36:15.000000Z"}</description>
      <content:encoded>{"uuid": "1083b8cf-66f9-47f3-ace7-e26e51790588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/91", "content": "CVE-2021\u201320226: a reference counting bug which leads to local privilege escalation in io_uring\n\nAn article describing a bug in the io_uring subsystem. Improper handling of files_struct references leading to a use-after-free.\n\nhttps://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a", "creation_timestamp": "2021-06-21T19:36:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1083b8cf-66f9-47f3-ace7-e26e51790588/export</guid>
      <pubDate>Mon, 21 Jun 2021 19:36:15 +0000</pubDate>
    </item>
    <item>
      <title>c889e2da-eaa9-4525-bbb4-4a5158234011</title>
      <link>https://db.gcve.eu/sighting/c889e2da-eaa9-4525-bbb4-4a5158234011/export</link>
      <description>{"uuid": "c889e2da-eaa9-4525-bbb4-4a5158234011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10664", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2021\u201320226 a reference counting bug which leads to local privilege escalation in io_uring.\n\nhttps://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a", "creation_timestamp": "2023-02-12T10:09:14.000000Z"}</description>
      <content:encoded>{"uuid": "c889e2da-eaa9-4525-bbb4-4a5158234011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10664", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2021\u201320226 a reference counting bug which leads to local privilege escalation in io_uring.\n\nhttps://flattsecurity.medium.com/cve-2021-20226-a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring-e946bd69177a", "creation_timestamp": "2023-02-12T10:09:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c889e2da-eaa9-4525-bbb4-4a5158234011/export</guid>
      <pubDate>Sun, 12 Feb 2023 10:09:14 +0000</pubDate>
    </item>
  </channel>
</rss>
