{"vulnerability": "CVE-2021-2279", "sightings": [{"uuid": "bc4af68e-a508-4e2d-a35a-e73c99d10f10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22794", "type": "seen", "source": "https://t.me/cibsecurity/40731", "content": "\u203c CVE-2021-22794 \u203c\n\nA CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause remote code execution. Affected Product: StruxureWare Data Center Expert (V7.8.1 and prior)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T20:18:09.000000Z"}, {"uuid": "423641cb-5c61-4e37-ba0b-2c8c5c2a43f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2279", "type": "seen", "source": "https://t.me/reconshell/680", "content": "CVE-2021-2279\n\nVulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). \n\nhttps://cve.reconshell.com/cve/CVE-2021-2279", "creation_timestamp": "2021-04-23T08:13:41.000000Z"}, {"uuid": "c3e50fbb-138e-4f2f-bf4e-047d94258406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22795", "type": "seen", "source": "https://t.me/cibsecurity/40730", "content": "\u203c CVE-2021-22795 \u203c\n\nA CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote code execution when performed over the network. Affected Product: StruxureWare Data Center Expert (V7.8.1 and prior)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T20:18:07.000000Z"}, {"uuid": "ae8e293f-a8dd-4d8f-8997-277ad3f4fd0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22796", "type": "seen", "source": "https://t.me/cibsecurity/37327", "content": "\u203c CVE-2021-22796 \u203c\n\nA CWE-287: Improper Authentication vulnerability exists that could allow remote code execution when a malicious file is uploaded. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-11T20:34:51.000000Z"}, {"uuid": "7908c2bb-67a6-45f1-9836-47bc09e542bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22797", "type": "seen", "source": "https://t.me/cibsecurity/40736", "content": "\u203c CVE-2021-22797 \u203c\n\nA CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) vulnerability exists that could cause malicious script to be deployed in an unauthorized location and may result in code execution on the engineering workstation when a malicious project file is loaded in the engineering software. Affected Product: EcoStruxure Control Expert (V15.0 SP1 and prior, including former Unity Pro), EcoStruxure Process Expert (2020 and prior, including former HDCS), SCADAPack RemoteConnect for x70 (All versions)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T20:18:18.000000Z"}, {"uuid": "0378c904-3cca-4744-b7fd-b65cf2977f6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22798", "type": "seen", "source": "https://t.me/cibsecurity/37338", "content": "\u203c CVE-2021-22798 \u203c\n\nA CWE-522: Insufficiently Protected Credentials vulnerability exists that could cause Sensitive data such as login credentials being exposed when a Network is sniffed. Affected Product: Conext? ComBox (All Versions)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-11T20:35:07.000000Z"}, {"uuid": "06eee373-3773-4e01-8d7f-93e1ef917cea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22791", "type": "seen", "source": "https://t.me/cibsecurity/28223", "content": "\u203c CVE-2021-22791 \u203c\n\nA CWE-787: Out-of-bounds Write vulnerability that could cause a Denial of Service on the Modicon PLC controller / simulator when updating the controller application with a specially crafted project file exists in Modicon M580 CPU (part numbers BMEP* and BMEH*, all versions), Modicon M340 CPU (part numbers BMXP34*, all versions), Modicon MC80 (part numbers BMKC80*, all versions), Modicon Momentum Ethernet CPU (part numbers 171CBU*, all versions), PLC Simulator for EcoStruxure\u00c2\u00aa Control Expert, including all Unity Pro versions (former name of EcoStruxure\u00c2\u00aa Control Expert, all versions), PLC Simulator for EcoStruxure\u00c2\u00aa Process Expert including all HDCS versions (former name of EcoStruxure\u00c2\u00aa Process Expert, all versions), Modicon Quantum CPU (part numbers 140CPU*, all versions), Modicon Premium CPU (part numbers TSXP5*, all versions).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T20:36:19.000000Z"}, {"uuid": "028dc0fa-586c-4efa-86e5-8397acef1020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22799", "type": "seen", "source": "https://t.me/cibsecurity/36477", "content": "\u203c CVE-2021-22799 \u203c\n\nA CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an internal network to an external network when an attacker manages to decrypt the SESU proxy password from the registry. Affected Product: Schneider Electric Software Update, V2.3.0 through V2.5.1\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T22:21:56.000000Z"}, {"uuid": "2ff804ec-7bf5-461c-9438-0201241a10c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22792", "type": "seen", "source": "https://t.me/cibsecurity/28232", "content": "\u203c CVE-2021-22792 \u203c\n\nA CWE-476: NULL Pointer Dereference vulnerability that could cause a Denial of Service on the Modicon PLC controller / simulator when updating the controller application with a specially crafted project file exists in Modicon M580 CPU (part numbers BMEP* and BMEH*, all versions), Modicon M340 CPU (part numbers BMXP34*, all versions), Modicon MC80 (part numbers BMKC80*, all versions), Modicon Momentum Ethernet CPU (part numbers 171CBU*, all versions), PLC Simulator for EcoStruxure\u00c2\u00aa Control Expert, including all Unity Pro versions (former name of EcoStruxure\u00c2\u00aa Control Expert, all versions), PLC Simulator for EcoStruxure\u00c2\u00aa Process Expert including all HDCS versions (former name of EcoStruxure\u00c2\u00aa Process Expert, all versions), Modicon Quantum CPU (part numbers 140CPU*, all versions), Modicon Premium CPU (part numbers TSXP5*, all versions).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T20:36:56.000000Z"}]}