{"vulnerability": "CVE-2021-3200", "sightings": [{"uuid": "6dcc7e04-3d98-4c9d-805f-c140de46917e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645220866032526", "content": "", "creation_timestamp": "2024-12-13T11:14:13.895947Z"}, {"uuid": "47a2a7a8-3aca-45f3-94f2-c8cd28361905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32008", "type": "seen", "source": "https://t.me/cibsecurity/38481", "content": "\u203c CVE-2021-32008 \u203c\n\nThis issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Improper Limitation of a Pathname to restricted directory, allows logged in GateManager admin to delete system Files or Directories.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-05T00:27:19.000000Z"}, {"uuid": "53b4f2f2-0224-4bed-bee0-c909dbc05fb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-3200", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "640cb8f6-73c0-43d2-9f27-1ea376799692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32007", "type": "seen", "source": "https://t.me/cvedetector/12864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-32007 - Secomea GateManager Protection Mechanism Failure Remote Information Leak\", \n  \"Content\": \"CVE ID : CVE-2021-32007 \nPublished : Dec. 13, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : This issue affects:  \nSecomea GateManager  \nVersion 9.5 and all prior versions.  \nProtection Mechanism Failure vulnerability in web server of Secomea GateManager to potentially leak information to remote servers. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T13:15:58.000000Z"}, {"uuid": "4c447a87-98c0-4ae0-a39c-0d3eee792cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32006", "type": "seen", "source": "https://t.me/cibsecurity/38687", "content": "\u203c CVE-2021-32006 \u203c\n\nThis issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Permission Issues vulnerability in LinkManager web portal of Secomea GateManager allows logged in LinkManager user to access stored SiteManager backup files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-10T20:19:17.000000Z"}, {"uuid": "8f440bfa-1b28-4fba-be30-ad6d289a8364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32004", "type": "seen", "source": "https://t.me/cibsecurity/32828", "content": "\u203c CVE-2021-32004 \u203c\n\nThis issue affects: Secomea GateManager All versions prior to 9.6. Improper Check of host header in web server of Secomea GateManager allows attacker to cause browser cache poisoning.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-23T00:20:10.000000Z"}, {"uuid": "0fb76c08-a2eb-4203-888a-71691e3aed80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32001", "type": "seen", "source": "https://t.me/cibsecurity/26554", "content": "\u203c CVE-2021-32001 \u203c\n\nA Missing Encryption of Sensitive Data vulnerability in k3s, kde2 of SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-28T14:13:18.000000Z"}, {"uuid": "1a3a0133-026c-4c05-a19b-c06d5e830bb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32000", "type": "seen", "source": "https://t.me/cibsecurity/26553", "content": "\u203c CVE-2021-32000 \u203c\n\nA UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-28T14:13:17.000000Z"}]}