{"vulnerability": "CVE-2021-3630", "sightings": [{"uuid": "a067f465-728e-4919-932c-7aead46bd1bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36306", "type": "seen", "source": "https://t.me/cibsecurity/32763", "content": "\u203c CVE-2021-36306 \u203c\n\nNetworking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-20T07:17:32.000000Z"}, {"uuid": "1e3d55b1-9a15-47ff-8a74-f411ca008a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3630", "type": "seen", "source": "https://t.me/reconshell/809", "content": "CVE-2021-3630\n\nAn out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault. \n\nhttps://cve.reconshell.com/cve/CVE-2021-3630", "creation_timestamp": "2021-07-15T07:33:22.000000Z"}, {"uuid": "9a163365-2340-4417-89e2-e238e390bb3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36302", "type": "seen", "source": "https://t.me/cibsecurity/37115", "content": "\u203c CVE-2021-36302 \u203c\n\nAll Dell EMC Integrated System for Microsoft Azure Stack Hub versions contain a privilege escalation vulnerability. A remote malicious user with standard level JEA credentials may potentially exploit this vulnerability to elevate privileges and take over the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-09T22:13:05.000000Z"}, {"uuid": "19ab08f8-eeb6-49f6-92ef-b952bb557235", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36301", "type": "seen", "source": "https://t.me/cibsecurity/32880", "content": "\u203c CVE-2021-36301 \u203c\n\nDell iDRAC 9 prior to version 4.40.40.00 and iDRAC 8 prior to version 2.80.80.80 contain a Stack Buffer Overflow in Racadm. An authenticated remote attacker may potentially exploit this vulnerability to control process execution and gain access to the underlying operating system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-23T22:21:10.000000Z"}, {"uuid": "e03e58ee-cc05-4e2c-a1fa-c6698313e2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36305", "type": "seen", "source": "https://t.me/cibsecurity/32362", "content": "\u203c CVE-2021-36305 \u203c\n\nDell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-13T02:39:25.000000Z"}, {"uuid": "621ac8e4-0817-476e-8000-8001991f0489", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36309", "type": "seen", "source": "https://t.me/cibsecurity/29850", "content": "\u203c CVE-2021-36309 \u203c\n\nDell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\\Radius credentials stored to read sensitive information and use it in further attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-02T00:30:00.000000Z"}, {"uuid": "e7359c2e-f039-478f-96ae-bb870a6bf33f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36308", "type": "seen", "source": "https://t.me/cibsecurity/32757", "content": "\u203c CVE-2021-36308 \u203c\n\nNetworking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-20T07:17:25.000000Z"}, {"uuid": "3471126f-18c0-4a0d-8d89-432558ee390a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36307", "type": "seen", "source": "https://t.me/cibsecurity/32756", "content": "\u203c CVE-2021-36307 \u203c\n\nNetworking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-20T07:17:24.000000Z"}]}