{"vulnerability": "CVE-2021-2321", "sightings": [{"uuid": "98d7406d-7613-40cf-80c2-9291b3add715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23214", "type": "seen", "source": "https://t.me/cibsecurity/38435", "content": "\u203c CVE-2021-23214 \u203c\n\nWhen the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-04T18:27:14.000000Z"}, {"uuid": "f94d95a9-1dc0-424b-bcf8-7257b6c59127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2321", "type": "seen", "source": "https://t.me/arpsyndicate/751", "content": "#ExploitObserverAlert\n\nCVE-2021-2321\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-2321. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 4.0\nNVD-ES: 1.5", "creation_timestamp": "2023-11-29T14:22:48.000000Z"}, {"uuid": "bf5175a7-64d3-44b3-b67b-15574fe6938e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23210", "type": "seen", "source": "https://t.me/cibsecurity/48824", "content": "\u203c CVE-2021-23210 \u203c\n\nA floating point exception (divide-by-zero) issue was discovered in SoX in functon read_samples() of voc.c file. An attacker with a crafted file, could cause an application to crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T00:24:17.000000Z"}, {"uuid": "0a50ce20-cc9d-4d8d-a1f6-891879a784ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23218", "type": "seen", "source": "https://t.me/cibsecurity/35194", "content": "\u203c CVE-2021-23218 \u203c\n\nWhen running with FIPS mode enabled, Mirantis Container Runtime 20.10.8 leaks memory during TLS Handshakes which could be abused to cause a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-10T18:15:15.000000Z"}]}