{"vulnerability": "CVE-2021-2335", "sightings": [{"uuid": "990a2797-9316-4853-bf46-ae1b6a747cba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23356", "type": "seen", "source": "https://t.me/cibsecurity/24906", "content": "\u203c CVE-2021-23356 \u203c\n\nThis affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-15T19:29:08.000000Z"}, {"uuid": "d524e36b-fc41-48a2-8da2-7b08f5e2cfa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23359", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/25090", "content": "\u203c CVE-2021-23359 \u203c\n\nThis affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-18T15:32:06.000000Z"}, {"uuid": "793f75f7-722f-4574-b454-0e4e91529d0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23353", "type": "seen", "source": "https://t.me/cibsecurity/24650", "content": "\u203c CVE-2021-23353 \u203c\n\nThis affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T22:51:59.000000Z"}, {"uuid": "b39ded2d-25ae-48b4-b527-c5b733a36a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23351", "type": "seen", "source": "https://t.me/cibsecurity/24564", "content": "\u203c CVE-2021-23351 \u203c\n\nThe package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-08T07:50:05.000000Z"}, {"uuid": "d6cdd9f7-694d-4b6d-9f71-75765c161fd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23355", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/24902", "content": "\u203c CVE-2021-23355 \u203c\n\nThis affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-15T19:29:03.000000Z"}, {"uuid": "f691586a-93a8-43c8-a9d6-b39cf4b6cef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2335", "type": "seen", "source": "https://t.me/cibsecurity/26322", "content": "\u203c CVE-2021-2335 \u203c\n\nVulnerability in the Oracle Database - Enterprise Edition Data Redaction component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Data Redaction. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition Data Redaction accessible data. CVSS 3.1 Base Score 3.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-21T18:45:17.000000Z"}, {"uuid": "3bc49332-6334-42c2-95b9-39690e61aeec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23354", "type": "seen", "source": "https://t.me/cibsecurity/24849", "content": "\u203c CVE-2021-23354 \u203c\n\nThe package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\\%(?:\\(([\\w_.]+)\\)|([1-9]\\d*)\\$)?([0 +\\-\\]*)(\\*|\\d+)?(\\.)?(\\*|\\d+)?[hlL]?([\\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-12T18:57:12.000000Z"}, {"uuid": "cc0bfd50-3931-46ea-be4f-c97aed66bafe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23352", "type": "seen", "source": "https://t.me/cibsecurity/24656", "content": "\u203c CVE-2021-23352 \u203c\n\nThis affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T22:52:07.000000Z"}, {"uuid": "d024708d-814f-40ba-81fa-21241c7ba526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23358", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7824", "content": "#Offensive_security\n1. Nemesida WAF - WAF bypass Tool\nhttps://github.com/nemesida-waf/waf-bypass\n2. Offensive/Defensive Measures for Azure IPv6 support\nhttps://rootsecdev.medium.com/offensive-defensive-measures-for-azure-ipv6-support-878c322ae6e0\n3. Detection script for CVE-2021-23358\n(Arbitrary Code Injection via the template function)\nhttps://github.com/EkamSinghWalia/Detection-script-for-cve-2021-23358", "creation_timestamp": "2023-02-26T15:28:30.000000Z"}]}