{"vulnerability": "CVE-2021-2442", "sightings": [{"uuid": "5fd3d042-91eb-4380-8e39-973b534da1c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24429", "type": "seen", "source": "https://t.me/arpsyndicate/2716", "content": "#ExploitObserverAlert\n\nCVE-2021-24429\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-24429. The Salon booking system WordPress plugin before 6.3.1 does not properly sanitise and escape the First Name field when booking an appointment, allowing low privilege users such as subscriber to set JavaScript in them, leading to a Stored Cross-Site Scripting (XSS) vulnerability. The Payload will then be triggered when an admin visits the \"Calendar\" page and the malicious script is executed in the admin context.\n\nFIRST-EPSS: 0.000780000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2024-01-09T05:40:04.000000Z"}, {"uuid": "c5ecc9a1-eaa3-40f9-a9d9-e6b17b37ae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24423", "type": "seen", "source": "https://t.me/arpsyndicate/686", "content": "#ExploitObserverAlert\n\nCVE-2021-24423\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-24423. The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.6.59 does not sanitise its updraft_service settings, allowing high privilege users to set malicious JavaScript payload in it and leading to a Stored Cross-Site Scripting issue\n\nFIRST-EPSS: 0.000580000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2023-11-29T06:48:58.000000Z"}, {"uuid": "22af903a-a44b-464c-aa55-aa43e314b2fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24428", "type": "seen", "source": "https://t.me/cibsecurity/26664", "content": "\u203c CVE-2021-24428 \u203c\n\nThe RSS for Yandex Turbo WordPress plugin through 1.30 does not sanitise or escape some of its settings before saving and outputing them in the admin dashboard, leading to an Authenticated Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-02T14:27:33.000000Z"}, {"uuid": "54062725-1318-4d69-a2ad-7bdf60d4b183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24423", "type": "seen", "source": "https://t.me/LearnExploit/3264", "content": "\u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u0632 \u062c\u0645\u0644\u0647 CVE-2021-25049 \u0648 CVE-2021-24865 \u062f\u0631 \u067e\u0644\u0627\u06af\u06cc\u0646 \u0647\u0627\u06cc Wordpress \u0627\u0645\u06a9\u0627\u0646 \u062d\u0645\u0644\u0647 Xss , SQL Injection , Csrf \u0648 ... \u0631\u0627 \u0628\u0631\u0627\u06cc \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc \u06a9\u0646\u062f . \n\n\u067e\u06cc\u0634\u0646\u0647\u0627\u062f \u0645\u06cc\u0634\u0647 \u06cc\u0648\u0632\u0631 \u0647\u0627 \u0633\u0631\u06cc\u0639\u0627 \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u0646\u0635\u0628 \u067e\u0686 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u06a9\u0646\u0646\u062f . \n\n\u0634\u0646\u0627\u0633\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627 : \n\nCVE-2021-25049\nCVE-2021-25062\nCVE-2021-25073\nCVE-2021-24423\nCVE-2021-24906\nCVE-2021-25017\nCVE-2021-24865\nCVE-2021-24858\n\n\u0645\u0646\u0628\u0639 : Wpscan\n\n#Wpscan #Wordpress \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-02-01T18:48:13.000000Z"}, {"uuid": "960f3429-b3c2-4f91-84fa-2f48e0ddffd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2442", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4828", "content": "#Threat_Research\n1. Looking for vulnerabilities in MediaTek audio DSP\nhttps://research.checkpoint.com/2021/looking-for-vulnerabilities-in-mediatek-audio-dsp\n// CVE-2021-0661, CVE-2021-0662, CVE-2021-0663\n2. Hunting for Vulnerabilities in VirtualBox Network Offloads\nhttps://www.sentinelone.com/labs/gsoh-no-hunting-for-vulnerabilities-in-virtualbox-network-offloads\n// CVE-2021-2145, CVE-2021-2310, CVE-2021-2442", "creation_timestamp": "2021-11-25T11:00:21.000000Z"}, {"uuid": "8e54b51d-e08e-4287-b336-5302aee5cb70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24421", "type": "seen", "source": "https://t.me/cibsecurity/26081", "content": "\u203c CVE-2021-24421 \u203c\n\nThe WP JobSearch WordPress plugin before 1.7.4 did not sanitise or escape multiple of its parameters from the my-resume page before outputting them in the page, allowing low privilege users to use JavaScript payloads in them and leading to a Stored Cross-Site Scripting issue\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-13T00:18:15.000000Z"}, {"uuid": "f51ffd61-231d-4b25-8d52-366bb505ca65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24426", "type": "seen", "source": "https://t.me/cibsecurity/26079", "content": "\u203c CVE-2021-24426 \u203c\n\nThe Backup by 10Web \u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u20ac\u0153 Backup and Restore Plugin WordPress plugin through 1.0.20 does not sanitise or escape the tab parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting issue\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-13T00:18:13.000000Z"}, {"uuid": "b9084f27-7f8a-44f0-8e8a-020ef91036ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2442", "type": "seen", "source": "https://t.me/BlueRedTeam/1224", "content": "#Threat_Research\n1. Looking for vulnerabilities in MediaTek audio DSP\nhttps://research.checkpoint.com/2021/looking-for-vulnerabilities-in-mediatek-audio-dsp\n// CVE-2021-0661, CVE-2021-0662, CVE-2021-0663\n2. Hunting for Vulnerabilities in VirtualBox Network Offloads\nhttps://www.sentinelone.com/labs/gsoh-no-hunting-for-vulnerabilities-in-virtualbox-network-offloads\n// CVE-2021-2145, CVE-2021-2310, CVE-2021-2442\n\n@BlueRedTeam", "creation_timestamp": "2021-11-25T10:36:56.000000Z"}]}