<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 08:43:01 +0000</lastBuildDate>
    <item>
      <title>ba40f523-86ae-4735-a1ad-1067dcb0063e</title>
      <link>https://db.gcve.eu/sighting/ba40f523-86ae-4735-a1ad-1067dcb0063e/export</link>
      <description>{"uuid": "ba40f523-86ae-4735-a1ad-1067dcb0063e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "seen", "source": "https://t.me/cibsecurity/30644", "content": "\u203c CVE-2021-40724 \u203c\n\nAcrobat Reader for Android versions 21.8.0 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:57.000000Z"}</description>
      <content:encoded>{"uuid": "ba40f523-86ae-4735-a1ad-1067dcb0063e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "seen", "source": "https://t.me/cibsecurity/30644", "content": "\u203c CVE-2021-40724 \u203c\n\nAcrobat Reader for Android versions 21.8.0 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ba40f523-86ae-4735-a1ad-1067dcb0063e/export</guid>
      <pubDate>Fri, 15 Oct 2021 18:28:57 +0000</pubDate>
    </item>
    <item>
      <title>dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4</title>
      <link>https://db.gcve.eu/sighting/dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4/export</link>
      <description>{"uuid": "dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8594", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 RCE in Adobe Acrobat Reader For Android (CVE-2021-40724).\n\nhttps://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-01-16T07:02:54.000000Z"}</description>
      <content:encoded>{"uuid": "dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8594", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 RCE in Adobe Acrobat Reader For Android (CVE-2021-40724).\n\nhttps://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-01-16T07:02:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dc41ffb2-92e2-41a6-b41e-cd34ac7e97d4/export</guid>
      <pubDate>Sun, 16 Jan 2022 07:02:54 +0000</pubDate>
    </item>
    <item>
      <title>7384e44b-9073-415f-ad06-c432e3aee60a</title>
      <link>https://db.gcve.eu/sighting/7384e44b-9073-415f-ad06-c432e3aee60a/export</link>
      <description>{"uuid": "7384e44b-9073-415f-ad06-c432e3aee60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5215", "content": "#exploit\n1. CVE-2021-40724:\nRCE in Adobe Acrobat Reader for Android\nhttps://hulkvision.github.io/blog/post1\n\n2. CVE-2021-32648:\nOctoberCMS &amp;lt; 1.0.472 - Auth Bypass\nhttps://github.com/Immersive-Labs-Sec/CVE-2021-32648", "creation_timestamp": "2022-01-21T06:24:19.000000Z"}</description>
      <content:encoded>{"uuid": "7384e44b-9073-415f-ad06-c432e3aee60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5215", "content": "#exploit\n1. CVE-2021-40724:\nRCE in Adobe Acrobat Reader for Android\nhttps://hulkvision.github.io/blog/post1\n\n2. CVE-2021-32648:\nOctoberCMS &amp;lt; 1.0.472 - Auth Bypass\nhttps://github.com/Immersive-Labs-Sec/CVE-2021-32648", "creation_timestamp": "2022-01-21T06:24:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7384e44b-9073-415f-ad06-c432e3aee60a/export</guid>
      <pubDate>Fri, 21 Jan 2022 06:24:19 +0000</pubDate>
    </item>
    <item>
      <title>22e275b8-0a71-4890-bf0f-9d5b009d6379</title>
      <link>https://db.gcve.eu/sighting/22e275b8-0a71-4890-bf0f-9d5b009d6379/export</link>
      <description>{"uuid": "22e275b8-0a71-4890-bf0f-9d5b009d6379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1421", "content": "RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)\nanalysis: https://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-02-18T10:41:39.000000Z"}</description>
      <content:encoded>{"uuid": "22e275b8-0a71-4890-bf0f-9d5b009d6379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1421", "content": "RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)\nanalysis: https://hulkvision.github.io/blog/post1/", "creation_timestamp": "2022-02-18T10:41:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/22e275b8-0a71-4890-bf0f-9d5b009d6379/export</guid>
      <pubDate>Fri, 18 Feb 2022 10:41:39 +0000</pubDate>
    </item>
    <item>
      <title>6633b72e-3e5b-410b-984c-3d9aa369a352</title>
      <link>https://db.gcve.eu/sighting/6633b72e-3e5b-410b-984c-3d9aa369a352/export</link>
      <description>{"uuid": "6633b72e-3e5b-410b-984c-3d9aa369a352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1422", "content": "Here is exploitation flow of RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)", "creation_timestamp": "2022-09-09T04:38:57.000000Z"}</description>
      <content:encoded>{"uuid": "6633b72e-3e5b-410b-984c-3d9aa369a352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1422", "content": "Here is exploitation flow of RCE in Adobe Acrobat Reader for Android (CVE-2021-40724)", "creation_timestamp": "2022-09-09T04:38:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6633b72e-3e5b-410b-984c-3d9aa369a352/export</guid>
      <pubDate>Fri, 09 Sep 2022 04:38:57 +0000</pubDate>
    </item>
    <item>
      <title>4d17bb9a-485a-40c2-af35-e9ef09957e21</title>
      <link>https://db.gcve.eu/sighting/4d17bb9a-485a-40c2-af35-e9ef09957e21/export</link>
      <description>{"uuid": "4d17bb9a-485a-40c2-af35-e9ef09957e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "Telegram/Y8KZH4iKLZNDV3OzlQacoZkHsOa4lWcU2LYqypPFXeeVEl4", "content": "", "creation_timestamp": "2025-06-15T21:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "4d17bb9a-485a-40c2-af35-e9ef09957e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40724", "type": "published-proof-of-concept", "source": "Telegram/Y8KZH4iKLZNDV3OzlQacoZkHsOa4lWcU2LYqypPFXeeVEl4", "content": "", "creation_timestamp": "2025-06-15T21:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4d17bb9a-485a-40c2-af35-e9ef09957e21/export</guid>
      <pubDate>Sun, 15 Jun 2025 21:00:05 +0000</pubDate>
    </item>
  </channel>
</rss>
