{"uuid": "f43151a3-3448-4243-b7f5-08c4a0bf3d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21702", "type": "seen", "source": "https://t.me/arpsyndicate/1784", "content": "#ExploitObserverAlert\n\nCVE-2021-21702\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2021-21702. In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.\n\nFIRST-EPSS: 0.008950000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-12T01:16:05.000000Z"}