{"vulnerability": "CVE-2021-3056", "sightings": [{"uuid": "6aadc0c0-5cec-4694-a5da-5537e179c8df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30561", "type": "seen", "source": "MISP/552ebc2a-5538-4af6-816f-aa5a4da4ccf5", "content": "", "creation_timestamp": "2021-08-25T19:07:56.000000Z"}, {"uuid": "da845a09-1f88-4cda-be23-7507586cfd63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "2f4e93e4-3859-488b-888e-558dc47e0182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "5301430c-f793-4230-b33f-73ffb58e9678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30561", "type": "seen", "source": "MISP/8ad41992-81f4-4b91-8e8a-05deaab255e0", "content": "", "creation_timestamp": "2024-11-14T06:09:46.000000Z"}, {"uuid": "f3a8461c-ac50-49f3-8210-28a3f4869f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "MISP/d8872196-b8b0-47d4-92ec-2e97321f42f2", "content": "", "creation_timestamp": "2024-11-14T06:09:20.000000Z"}, {"uuid": "36f08e98-82f8-40aa-8400-af8817e36d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971061", "content": "", "creation_timestamp": "2024-12-24T20:23:42.714038Z"}, {"uuid": "5d6ddefd-dd01-4765-8051-92018fb6c638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:54.000000Z"}, {"uuid": "0dee2881-03a6-4222-863d-056d2dcc3fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-30563", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3193f12b-95f5-4bf1-b263-8d77a7c406c8", "content": "", "creation_timestamp": "2026-02-02T12:28:46.884825Z"}, {"uuid": "c55cd868-332c-4e61-b0e8-b6c10631b4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=613", "content": "", "creation_timestamp": "2021-07-16T04:00:00.000000Z"}, {"uuid": "65d49c31-3b2d-46bd-b354-828042e44064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=614", "content": "", "creation_timestamp": "2021-07-20T04:00:00.000000Z"}, {"uuid": "8937a941-8f1a-4615-84f1-ebbf6db635ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "exploited", "source": "https://t.me/cKure/6187", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2021-30563: Google has pushed out a new security update to Chrome browser for Windows, Mac, and Linux with multiple fixes, including a zero-day that it says is being exploited in the wild.\n\nhttps://thehackernews.com/2021/07/update-your-chrome-browser-to-patch-new.html", "creation_timestamp": "2021-07-16T10:57:01.000000Z"}, {"uuid": "4c7a5304-2597-4aa0-96fe-4e662d85aac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "published-proof-of-concept", "source": "https://t.me/infosec1z/7", "content": "CVE-2021-30563 : Type Confusion in V8, Chrome 0day POC is leaked\n\n\nhttps://pastebin.com/49kMiS7j\n\n\u2796\u2796 @infosec1z \u2796\u2796", "creation_timestamp": "2021-08-01T17:36:40.000000Z"}, {"uuid": "83d18812-550c-429d-a56b-30a9da0bb05f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30569", "type": "seen", "source": "https://t.me/cibsecurity/26771", "content": "\u203c CVE-2021-30569 \u203c\n\nUse after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:28:52.000000Z"}, {"uuid": "a64205bb-011d-4b2c-a874-1029e7e738af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3056", "type": "seen", "source": "https://t.me/cibsecurity/32189", "content": "\u203c CVE-2021-3056 \u203c\n\nA memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T20:36:39.000000Z"}, {"uuid": "db0ff172-3db7-4fcd-8145-1b2941ce5b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30568", "type": "seen", "source": "https://t.me/cibsecurity/26788", "content": "\u203c CVE-2021-30568 \u203c\n\nHeap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:29:15.000000Z"}, {"uuid": "47d571ca-a00c-4071-aede-c6c49f86d5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30565", "type": "seen", "source": "https://t.me/cibsecurity/26784", "content": "\u203c CVE-2021-30565 \u203c\n\nOut of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:29:10.000000Z"}, {"uuid": "7e313320-44a9-48d9-97a1-f071009eca1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30567", "type": "seen", "source": "https://t.me/cibsecurity/26779", "content": "\u203c CVE-2021-30567 \u203c\n\nUse after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T00:29:05.000000Z"}, {"uuid": "8c305155-7653-4bbd-9228-aeb89bf6220a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "exploited", "source": "https://t.me/cyberbannews_ir/3678", "content": "\ud83d\uded1\u0631\u0641\u0639 \u0647\u0634\u062a\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u0627\u0632 \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645 \n\n\u0634\u0631\u06a9\u062a \u06af\u0648\u06af\u0644 \u0628\u0647\u200c\u062a\u0627\u0632\u06af\u06cc \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u060c \u0645\u06a9 \u0648 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u062a\u0627 \u0646\u0633\u062e\u0647 91.0.4472.164 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u06a9\u0631\u062f\u0647 \u0648 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u06cc\u06af\u0631\u06cc \u0631\u0627 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u00abCVE-2021-30563\u00bb \u06a9\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0631\u062f\u0646\u062f\u060c \u0628\u0631\u0637\u0631\u0641 \u0646\u0645\u0648\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0632 \u0646\u0648\u0639 type confusion \u0628\u0648\u062f\u0647 \u0648 \u0627\u0632 \u0633\u0648\u06cc \u06cc\u06a9 \u0645\u062d\u0642\u0642 \u0646\u0627\u0634\u0646\u0627\u0633 \u0628\u0647 \u06af\u0648\u06af\u0644 \u06af\u0632\u0627\u0631\u0634 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n#\u06af\u0648\u06af\u0644_\u06a9\u0631\u0648\u0645\n\n\u2705 \u0628\u06cc\u0634\u062a\u0631 \u0628\u062e\u0648\u0627\u0646\u06cc\u062f:\nhttps://bit.ly/2V9vRod\n\n @cyberbannews_ir", "creation_timestamp": "2021-07-28T01:56:23.000000Z"}, {"uuid": "002a9147-faf5-4290-b896-54906993b159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "Telegram/CwnrqNQWjq0YVITvKyfHrw8ynaLsYtZpxOsm5_6UKdbWpHK4", "content": "", "creation_timestamp": "2025-02-19T22:21:30.000000Z"}, {"uuid": "051a0f6a-b92e-44da-b865-29f589e9dd59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/812", "content": "CVE-2021-30563 Chrome v8\u985e\u578b\u6df7\u6dc6\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-30563_Chrome_v8%E9%A1%9E%E5%9E%8B%E6%B7%B7%E6%B7%86%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T04:42:00.000000Z"}, {"uuid": "1ffb91e7-8afd-46e0-8adf-5e147cdce506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30561", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4103", "content": "#exploit\nCVE-2021-30561:\nChrome JS object corruption in WasmJs::InstallConditionalFeatures\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2197", "creation_timestamp": "2021-08-19T12:31:00.000000Z"}, {"uuid": "ea2eb21c-de5b-4f1e-9693-b66de56e821f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30563", "type": "exploited", "source": "https://t.me/thehackernews/1372", "content": "Google has pushed out a new security update for the Chrome browser for Windows, Mac and Linux that fixes several vulnerabilities, including a zero-day vulnerability (CVE-2021-30563) that Google says is being exploited in the wild.\n\nRead: https://thehackernews.com/2021/07/update-your-chrome-browser-to-patch-new.html", "creation_timestamp": "2021-07-16T07:11:18.000000Z"}]}