{"vulnerability": "CVE-2021-27219", "sightings": [{"uuid": "593e2889-ab66-4de8-aa40-997b29935569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-27219", "type": "seen", "source": "https://t.me/cibsecurity/23612", "content": "\u203c CVE-2021-27219 \u203c\n\nAn issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-15T20:46:54.000000Z"}, {"uuid": "6f579861-ea6d-42f5-acf5-04d7e86bfada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-27219", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2991", "content": "#exploit \nCVE-2021-27219:\nInteger Overflow in GLib\nhttps://securitylab.github.com/advisories/GHSL-2021-045-g_bytes_new\n\n+ Type confusion vulnerability\nin the varlink interface of systemd-resolved:\nhttps://securitylab.github.com/advisories/GHSL-2021-049-systemd-resolved-varlink", "creation_timestamp": "2022-07-04T20:49:36.000000Z"}]}