{"vulnerability": "CVE-2021-3313", "sightings": [{"uuid": "7855bc19-3382-4290-b622-04eddbcb3d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-33139", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "c7f789be-e5e1-44ff-afc0-7a065bb8bcd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33134", "type": "seen", "source": "https://t.me/ctinow/192229", "content": "https://ift.tt/c8vpXwE\nCVE-2021-33134", "creation_timestamp": "2024-02-23T22:27:11.000000Z"}, {"uuid": "3c6aaf48-2a45-41dd-bc9a-2c3bd98faabe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33133", "type": "seen", "source": "https://t.me/ctinow/192228", "content": "https://ift.tt/Gmjo3ab\nCVE-2021-33133", "creation_timestamp": "2024-02-23T22:27:10.000000Z"}, {"uuid": "fcbe6921-1ae9-44d7-b015-8195c0398457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33138", "type": "seen", "source": "https://t.me/ctinow/192231", "content": "https://ift.tt/82CqbOM\nCVE-2021-33138", "creation_timestamp": "2024-02-23T22:27:13.000000Z"}, {"uuid": "58fc1276-8d71-403e-902a-87e78f135725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33136", "type": "seen", "source": "https://t.me/ctinow/192230", "content": "https://ift.tt/MmyF6wj\nCVE-2021-33136", "creation_timestamp": "2024-02-23T22:27:12.000000Z"}, {"uuid": "b10152cf-1af7-460c-9780-0fa347c052c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33132", "type": "seen", "source": "https://t.me/ctinow/192227", "content": "https://ift.tt/0YzgR5q\nCVE-2021-33132", "creation_timestamp": "2024-02-23T22:27:09.000000Z"}, {"uuid": "fecfe83d-5f1d-4112-88c4-cf7f20e15da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33131", "type": "seen", "source": "https://t.me/ctinow/192226", "content": "https://ift.tt/RA7tHUZ\nCVE-2021-33131", "creation_timestamp": "2024-02-23T22:27:08.000000Z"}, {"uuid": "ddeb7f0f-cc60-4f93-aff9-0da9bf6c9e4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33139", "type": "seen", "source": "https://t.me/cibsecurity/37168", "content": "\u203c CVE-2021-33139 \u203c\n\nImproper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T02:19:30.000000Z"}, {"uuid": "a6b5d069-93e9-4da4-a563-c5f1b4d86eeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-33137", "type": "seen", "source": "https://t.me/cibsecurity/37137", "content": "\u203c CVE-2021-33137 \u203c\n\nOut-of-bounds write in the Intel(R) Kernelflinger project may allow an authenticated user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-10T02:13:14.000000Z"}]}