<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:07:28 +0000</lastBuildDate>
    <item>
      <title>bd629ff4-2937-46fa-b949-ff31c059192b</title>
      <link>https://db.gcve.eu/sighting/bd629ff4-2937-46fa-b949-ff31c059192b/export</link>
      <description>{"uuid": "bd629ff4-2937-46fa-b949-ff31c059192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40526", "type": "seen", "source": "https://t.me/cibsecurity/31110", "content": "\u203c CVE-2021-40526 \u203c\n\nIncorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-25T14:13:29.000000Z"}</description>
      <content:encoded>{"uuid": "bd629ff4-2937-46fa-b949-ff31c059192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40526", "type": "seen", "source": "https://t.me/cibsecurity/31110", "content": "\u203c CVE-2021-40526 \u203c\n\nIncorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-25T14:13:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bd629ff4-2937-46fa-b949-ff31c059192b/export</guid>
      <pubDate>Mon, 25 Oct 2021 14:13:29 +0000</pubDate>
    </item>
  </channel>
</rss>
