{"vulnerability": "CVE-2021-3052", "sightings": [{"uuid": "249d6c0c-3570-4ae2-abb7-fda16a92e332", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30522", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3677", "content": "#Threat_Research\n1. Linux marketplaces vulnerable to RCE and supply chain attacks\nhttps://positive.security/blog/hacking-linux-marketplaces\n2. CVE-2021-30522:\nCode execution vulnerability in Google Web Audio API\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2021-1251", "creation_timestamp": "2022-06-01T19:10:44.000000Z"}, {"uuid": "3369dd41-65d1-4bd6-a0f6-962056b407f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30529", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ee6a4e24700fb9ee1d046e05e4fcb180", "content": "", "creation_timestamp": "2025-09-02T15:45:12.000000Z"}, {"uuid": "3c7d18c9-41b2-4039-bc6a-85d70b184b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3052", "type": "seen", "source": "https://t.me/cibsecurity/28516", "content": "\u203c CVE-2021-3052 \u203c\n\nA reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.20; PAN-OS 9.0 versions earlier than 9.0.14; PAN-OS 9.1 versions earlier than 9.1.10; PAN-OS 10.0 versions earlier than 10.0.2. This issue does not affect Prisma Access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T20:45:53.000000Z"}, {"uuid": "606d04a3-a487-408a-bd8a-98fcd65725bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30528", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4481", "content": "#Red_Team_Tactics\n1. Escaping to Java to escape the Chrome sandbox (PoC for CVE-2021-30528)\nhttps://securitylab.github.com/research/chrome_sbx_java\n2. Abusing Weak ACL on Certificate Templates\nhttps://github.com/daem0nc0re/Abusing_Weak_ACL_on_Certificate_Templates\n]-&gt; Python implementation for AD certificate abuse: https://github.com/ollypwn/Certipy", "creation_timestamp": "2024-10-04T14:35:01.000000Z"}]}