{"vulnerability": "CVE-2021-26085", "sightings": [{"uuid": "86d8d27f-6570-4ad2-90ef-4bddf7928054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "MISP/63ddead6-4b82-414c-ad8e-c516b950b446", "content": "", "creation_timestamp": "2021-10-25T22:32:43.000000Z"}, {"uuid": "96f48f22-bfe5-4026-ae55-8a6cc56cb2e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "bd3ce9ca-3a36-4ea9-b041-a5a8ac9090b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971482", "content": "", "creation_timestamp": "2024-12-24T20:29:57.802440Z"}, {"uuid": "7e4014e0-0cc8-4855-91df-f3352604cec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:29.000000Z"}, {"uuid": "96f5d504-fe65-4951-a62d-7d96c3c6cedc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/679", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAtlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)\nURL\uff1ahttps://github.com/ColdFusionX/CVE-2021-26085", "creation_timestamp": "2021-10-12T05:12:34.000000Z"}, {"uuid": "dd20a0b3-46e7-4b03-af5f-de77a0338c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-26085", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8b0072f5-f85e-4406-8ef8-aae614fb5cae", "content": "", "creation_timestamp": "2026-02-02T12:27:55.459870Z"}, {"uuid": "5d55baff-63ef-4419-9220-2ac4a9727368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4511", "content": "#exploit\n1. CVE-2021-34486:\nWindows 20H2 x64 Etw LPE\nhttps://github.com/KaLendsi/CVE-2021-34486\n\n2. CVE-2021-26085 / CVE-2021-26086:\nAtlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability / Atlassian Jira Server/DataCenter 8.4.0 - Arbitrary File read\nhttps://github.com/ColdFusionX/CVE-2021-26085\nhttps://github.com/ColdFusionX/CVE-2021-26086", "creation_timestamp": "2021-10-13T11:07:01.000000Z"}, {"uuid": "dafa3586-6bde-475d-bd11-f6ad56dd7249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "https://t.me/ctinow/41906", "content": "MariaDB: Path Traversal CVE-2021-26086 CVE-2021-26085\n\nhttps://ift.tt/3q7raJ2", "creation_timestamp": "2021-11-05T19:01:32.000000Z"}, {"uuid": "a8392cba-51ef-45ac-96e0-9c0621f86d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "seen", "source": "https://t.me/cibsecurity/26724", "content": "\u203c CVE-2021-26085 \u203c\n\nAffected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-03T07:27:39.000000Z"}, {"uuid": "30f76e3d-bdb2-4c42-9ed7-890d9086a570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-26085", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1124", "content": "1. CVE-2021-34486:\nWindows 20H2 x64 Etw LPE\nhttps://github.com/KaLendsi/CVE-2021-34486\n\n2. CVE-2021-26085 / CVE-2021-26086:\nAtlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability / Atlassian Jira Server/DataCenter 8.4.0 - Arbitrary File read\nhttps://github.com/ColdFusionX/CVE-2021-26085\nhttps://github.com/ColdFusionX/CVE-2021-26086\n#exploit\n@BlueRedTeam", "creation_timestamp": "2021-10-13T10:34:16.000000Z"}]}