{"vulnerability": "CVE-2021-3121", "sightings": [{"uuid": "f366fc40-3c44-437c-a1c0-446380582e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31213", "type": "seen", "source": "https://t.me/reconshell/713", "content": "CVE-2021-31213\n\nVisual Studio Code Remote Containers Extension Remote Code Execution Vulnerability\n\nhttps://cve.reconshell.com/cve/CVE-2021-31213", "creation_timestamp": "2021-05-19T06:02:42.000000Z"}, {"uuid": "a6e18fc3-9dda-4512-a22f-38d8beccf8f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3121", "type": "seen", "source": "https://t.me/arpsyndicate/2803", "content": "#ExploitObserverAlert\n\nCVE-2021-3121\n\nDESCRIPTION: Exploit Observer has 17 entries in 3 file formats related to CVE-2021-3121. An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the \"skippy peanut butter\" issue.\n\nFIRST-EPSS: 0.008290000\nNVD-IS: 4.7\nNVD-ES: 3.9", "creation_timestamp": "2024-01-15T19:46:59.000000Z"}, {"uuid": "90aeba5b-d3a2-499a-a335-a57d8a24cacd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31217", "type": "seen", "source": "https://t.me/cibsecurity/26123", "content": "\u203c CVE-2021-31217 \u203c\n\nIn SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-13T22:19:25.000000Z"}, {"uuid": "b831b31f-7e95-45e1-a927-75d72e0997de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31216", "type": "seen", "source": "https://t.me/cibsecurity/26249", "content": "\u203c CVE-2021-31216 \u203c\n\nSiren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-19T16:32:20.000000Z"}, {"uuid": "f0aace94-be45-4b42-b43c-b80cf7d8d6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3121", "type": "seen", "source": "https://t.me/cibsecurity/21896", "content": "\u203c CVE-2021-3121 \u203c\n\nAn issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the \"skippy peanut butter\" issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-11T12:45:18.000000Z"}]}