{"vulnerability": "CVE-2021-3152", "sightings": [{"uuid": "8b9b933b-90d2-4a95-b213-5d6dbddb3183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3152", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-3152.yaml", "content": "", "creation_timestamp": "2026-04-22T08:43:03.000000Z"}, {"uuid": "156cf8f6-04d1-434c-a525-8f0f68d75e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3152", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mk6vwthxjx2x", "content": "", "creation_timestamp": "2026-04-23T21:03:09.519642Z"}, {"uuid": "78c59cd2-bfe8-4db4-824d-c2f4bd66a5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31522", "type": "seen", "source": "https://t.me/cibsecurity/35042", "content": "\u203c CVE-2021-31522 \u203c\n\nKylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-06T16:41:06.000000Z"}]}