{"vulnerability": "CVE-2021-2177", "sightings": [{"uuid": "0aeb512d-e512-4088-b54a-fcb214773ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21777", "type": "seen", "source": "https://t.me/cibsecurity/25510", "content": "\u203c CVE-2021-21777 \u203c\n\nAn information disclosure vulnerability exists in the Ethernet/IP UDP handler functionality of EIP Stack Group OpENer 2.3 and development commit 8c73bf3. A specially crafted network request can lead to an out-of-bounds read.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-17T14:40:56.000000Z"}, {"uuid": "4ea6738e-1845-41b6-b322-4e4d260df6b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21779", "type": "seen", "source": "https://t.me/cibsecurity/26000", "content": "\u203c CVE-2021-21779 \u203c\n\nA use-after-free vulnerability exists in the way Webkit\u00e2\u20ac\u2122s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-08T16:38:52.000000Z"}, {"uuid": "69b07d7f-ae4a-44cf-b2c2-59719b24fd3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21775", "type": "seen", "source": "https://t.me/cibsecurity/25992", "content": "\u203c CVE-2021-21775 \u203c\n\nA use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-08T02:38:09.000000Z"}, {"uuid": "b3d650f2-6ef8-415e-9208-dfb6aa626231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21772", "type": "seen", "source": "https://t.me/cibsecurity/24713", "content": "\u203c CVE-2021-21772 \u203c\n\nA use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-10T20:53:12.000000Z"}, {"uuid": "8b92165d-d32a-40ab-8586-f7dfa6938814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21779", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3535", "content": "#Threat_Research\n1. Use-after-free vulnerability in WebKitGTK (CVE-2021-21779)\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2021-1238\n2. Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra\nhttps://swarm.ptsecurity.com/guide-to-p-code-injection", "creation_timestamp": "2021-06-04T11:01:24.000000Z"}]}