{"vulnerability": "CVE-2021-3618", "sightings": [{"uuid": "b162cb46-31e1-469c-8afd-0cfaf7e5affc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3618", "type": "seen", "source": "Telegram/grSMU6R8jT_KA3NJJ29hCWDg1u42xiJmiiB1TWfM6_lpYrA", "content": "", "creation_timestamp": "2024-01-19T11:44:25.000000Z"}, {"uuid": "0f199f90-7ab9-43b5-bb51-3becc43fb780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36188", "type": "seen", "source": "https://t.me/cibsecurity/33619", "content": "\u203c CVE-2021-36188 \u203c\n\nA improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted GET parameters in requests to login and error handlers\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T20:22:52.000000Z"}, {"uuid": "88e446ff-aeb0-4091-93d6-c830c848a13f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36184", "type": "seen", "source": "https://t.me/cibsecurity/31635", "content": "\u203c CVE-2021-36184 \u203c\n\nA improper neutralization of Special Elements used in an SQL Command ('SQL Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:29.000000Z"}, {"uuid": "b3628ced-7de3-4280-aec0-6a2cdf96e064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3618", "type": "seen", "source": "https://t.me/RipperSec/712", "content": "\u0633\u0652\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0645\u0650 \u0627\u0644\u0644\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645\u0650\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nTarget : https://bankjerusalem.co.il\nIP : 66.22.119.20\nHostname : 66.22.119.20\nISP : Redware Inc &amp; Dc Protection Ltd\nInfo: No WAF detected by the generic detection\n\nPORT : 53 filtered domain\nPORT : 80 http\nPORT : 443 https \nMETHOD : TCP/UDP\nDomain : isoc.org.il 51.17.123.48 \nASN: AS16509 \nCountry: IL \nCity: TEL AVIV \nDomain: Amazonaws.com | IIX.NET.IL | ISOC.org.il | \nPorts: 80 | 443 | \nHTTP Status: 301 | \nProvider: Amazon.com, Inc. \nOrganization: A100 Row Inc \nPossible vulnerabilities: CVE-2021-3618 | CVE-2023-44487 |\n\nGreetz:- All Muslim Hackers\n\n#TengkorakCyberCrew \n#EagleCyberCrew\n#RipperSec\n#KhalifahCyberCrew\n#HelangMerahGroup \n#LaskarPembebasanPalestina\n#TeamCyberAbabil\n#Cyberwar PaLestiNe 3.0\n#TABM MALAYSIA-PALESTINE (MyPA)\n\nCome join us!!\nhttps://t.me/MalaysiaHacktivist\nhttps://t.me/MalaysiaHacktivistz", "creation_timestamp": "2024-02-12T14:43:23.000000Z"}, {"uuid": "1ad8428c-7753-4c88-b6f6-e780890caa8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3618", "type": "seen", "source": "https://t.me/ashaburroyah313/870", "content": "\u0633\u0652\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0640\u0645\u0650 \u0627\u0644\u0644\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0652\u0645\u0650\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nTarget : https://bankjerusalem.co.il\nIP : 66.22.119.20\nHostname : 66.22.119.20\nISP : Redware Inc &amp; Dc Protection Ltd\nInfo: No WAF detected by the generic detection\n\nPORT : 53 filtered domain\nPORT : 80 http\nPORT : 443 https \nMETHOD : TCP/UDP\nDomain : isoc.org.il 51.17.123.48 \nASN: AS16509 \nCountry: IL \nCity: TEL AVIV \nDomain: Amazonaws.com | IIX.NET.IL | ISOC.org.il | \nPorts: 80 | 443 | \nHTTP Status: 301 | \nProvider: Amazon.com, Inc. \nOrganization: A100 Row Inc \nPossible vulnerabilities: CVE-2021-3618 | CVE-2023-44487 |\n\nGreetz:- All Muslim Hackers\n\n#TengkorakCyberCrew \n#EagleCyberCrew\n#RipperSec\n#KhalifahCyberCrew\n#HelangMerahGroup \n#LaskarPembebasanPalestina\n#TeamCyberAbabil\n#Cyberwar PaLestiNe 3.0\n#TABM MALAYSIA-PALESTINE (MyPA)\n\nCome join us!!\nhttps://t.me/MalaysiaHacktivist\nhttps://t.me/MalaysiaHacktivistz", "creation_timestamp": "2024-02-12T14:57:44.000000Z"}, {"uuid": "c6cdc40f-384c-4d6c-88f6-a2c3473c510e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36183", "type": "seen", "source": "https://t.me/cibsecurity/31624", "content": "\u203c CVE-2021-36183 \u203c\n\nAn improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:07.000000Z"}, {"uuid": "1ab6211d-4a53-4b0d-b221-53d15f4861a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36186", "type": "seen", "source": "https://t.me/cibsecurity/31634", "content": "\u203c CVE-2021-36186 \u203c\n\nA stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:27.000000Z"}]}