<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 11:47:59 +0000</lastBuildDate>
    <item>
      <title>b1865bcc-0c3c-46cf-9391-8a8cc54dd675</title>
      <link>https://db.gcve.eu/sighting/b1865bcc-0c3c-46cf-9391-8a8cc54dd675/export</link>
      <description>{"uuid": "b1865bcc-0c3c-46cf-9391-8a8cc54dd675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "seen", "source": "https://t.me/cibsecurity/34671", "content": "\u203c CVE-2021-45335 \u203c\n\nSandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T16:23:13.000000Z"}</description>
      <content:encoded>{"uuid": "b1865bcc-0c3c-46cf-9391-8a8cc54dd675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "seen", "source": "https://t.me/cibsecurity/34671", "content": "\u203c CVE-2021-45335 \u203c\n\nSandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T16:23:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b1865bcc-0c3c-46cf-9391-8a8cc54dd675/export</guid>
      <pubDate>Mon, 27 Dec 2021 16:23:13 +0000</pubDate>
    </item>
    <item>
      <title>5cd353f7-0ac4-4cf8-93e5-86812dd27e0f</title>
      <link>https://db.gcve.eu/sighting/5cd353f7-0ac4-4cf8-93e5-86812dd27e0f/export</link>
      <description>{"uuid": "5cd353f7-0ac4-4cf8-93e5-86812dd27e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7732", "content": "#exploit\n1. CVE-2021-45335, CVE-2021-45336, CVE-2021-45337:\nEoP from Everyone through Avast Sandbox to System AmPPL\nhttps://the-deniss.github.io/posts/2023/02/09/elevation-of-privileges-from-everyone-through-avast-av-sandbox-to-system-amppl.html\n\n2. CVE-2023-21746:\nThe LocalPotato attack - type of NTLM reflection attack that targets local authentication\nhttps://github.com/decoder-it/LocalPotato", "creation_timestamp": "2023-02-14T04:50:02.000000Z"}</description>
      <content:encoded>{"uuid": "5cd353f7-0ac4-4cf8-93e5-86812dd27e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45335", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7732", "content": "#exploit\n1. CVE-2021-45335, CVE-2021-45336, CVE-2021-45337:\nEoP from Everyone through Avast Sandbox to System AmPPL\nhttps://the-deniss.github.io/posts/2023/02/09/elevation-of-privileges-from-everyone-through-avast-av-sandbox-to-system-amppl.html\n\n2. CVE-2023-21746:\nThe LocalPotato attack - type of NTLM reflection attack that targets local authentication\nhttps://github.com/decoder-it/LocalPotato", "creation_timestamp": "2023-02-14T04:50:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5cd353f7-0ac4-4cf8-93e5-86812dd27e0f/export</guid>
      <pubDate>Tue, 14 Feb 2023 04:50:02 +0000</pubDate>
    </item>
  </channel>
</rss>
