{"vulnerability": "CVE-2021-3169", "sightings": [{"uuid": "c9f5f258-3bfa-4a40-90f1-3e6476f4ea4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3169", "type": "seen", "source": "https://t.me/cibsecurity/26452", "content": "\u203c CVE-2021-3169 \u203c\n\nAn issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-24T00:37:58.000000Z"}, {"uuid": "9da5546f-0129-4f79-ba6f-f4d104aa9ee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-31693", "type": "seen", "source": "https://t.me/cibsecurity/53692", "content": "\u203c CVE-2021-31693 \u203c\n\nVMware Tools for Windows (12.x.y prior to 12.1.5, 11.x.y and 10.x.y) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest OS, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest OS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-30T00:29:51.000000Z"}]}