{"vulnerability": "CVE-2021-3051", "sightings": [{"uuid": "add9dcce-6426-4eb5-92d0-6ce0264a6dbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30517", "type": "seen", "source": "https://t.me/arpsyndicate/843", "content": "#ExploitObserverAlert\n\nCVE-2021-30517\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2021-30517. Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\nFIRST-EPSS: 0.005420000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-01T08:19:51.000000Z"}, {"uuid": "e7070f46-7468-40ec-a7f5-b3ff065086b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3051", "type": "seen", "source": "https://t.me/cibsecurity/28512", "content": "\u203c CVE-2021-3051 \u203c\n\nAn improper verification of cryptographic signature vulnerability exists in Cortex XSOAR SAML authentication that enables an unauthenticated network-based attacker with specific knowledge of the Cortex XSOAR instance to access protected resources and perform unauthorized actions on the Cortex XSOAR server. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 1578677; Cortex XSOAR 6.0.2 builds earlier than 1576452; Cortex XSOAR 6.1.0 builds earlier than 1578663; Cortex XSOAR 6.2.0 builds earlier than 1578666. All Cortex XSOAR instances hosted by Palo Alto Networks are protected from this vulnerability; no additional action is required for these instances.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T20:45:44.000000Z"}]}