{"vulnerability": "CVE-2021-29425", "sightings": [{"uuid": "c3926b66-f429-484f-b28d-bc5ba1e1708c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-29425", "type": "seen", "source": "https://t.me/ctinow/182546", "content": "https://ift.tt/DBQF0uX\nCVE-2021-29425 | Oracle Utilties Application Framework 4.3.0.3.0/4.3.0.6.0/4.4.0.0.0/4.4.0.2.0 General input validation", "creation_timestamp": "2024-02-10T13:11:15.000000Z"}, {"uuid": "aad58a55-2b54-4679-999c-6b4eec465720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-29425", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwpcbonym62u", "content": "", "creation_timestamp": "2025-08-18T21:02:44.314644Z"}, {"uuid": "689a6371-be9c-477d-8602-58b0c3c9d0e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-29425", "type": "seen", "source": "https://t.me/ctinow/182066", "content": "https://ift.tt/MUHgpQO\nCVE-2021-29425 | Oracle Hyperion Planning 11.2.14.0.000 Security input validation", "creation_timestamp": "2024-02-09T15:26:55.000000Z"}, {"uuid": "a3843204-09c3-474f-8244-e84255a213d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-29425", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4018", "content": "#exploit\n1. CVE-2021-29425:\nApache Commons IO &lt;2.7 - \"Limited\" Path Traversal\nhttps://github.com/AlAIAL90/CVE-2021-29425\n\n2. CVE-2021-29922:\nRust standard library \"net\" - Improper Input Validation of octal literals in rust 1.52.0 std::net and below results in indeterminate SSRF/RFI\nhttps://sick.codes/sick-2021-015", "creation_timestamp": "2024-10-10T18:38:59.000000Z"}]}