{"vulnerability": "CVE-2021-21779", "sightings": [{"uuid": "8b92165d-d32a-40ab-8586-f7dfa6938814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21779", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3535", "content": "#Threat_Research\n1. Use-after-free vulnerability in WebKitGTK (CVE-2021-21779)\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2021-1238\n2. Guide to P-code Injection: Changing the intermediate representation of code on the fly in Ghidra\nhttps://swarm.ptsecurity.com/guide-to-p-code-injection", "creation_timestamp": "2021-06-04T11:01:24.000000Z"}, {"uuid": "4ea6738e-1845-41b6-b322-4e4d260df6b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21779", "type": "seen", "source": "https://t.me/cibsecurity/26000", "content": "\u203c CVE-2021-21779 \u203c\n\nA use-after-free vulnerability exists in the way Webkit\u00e2\u20ac\u2122s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-08T16:38:52.000000Z"}]}