{"vulnerability": "CVE-2021-3669", "sightings": [{"uuid": "6301b619-a73a-45cd-9328-c34f232c5321", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3669", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5978", "content": "|       CVE-2022-1184   1.7     https://vulners.com/cve/CVE-2022-1184                               |       CVE-2022-1016   1.7     https://vulners.com/cve/CVE-2022-1016                               |       CVE-2022-0852   1.7     https://vulners.com/cve/CVE-2022-0852                               |       CVE-2022-0851   1.7     https://vulners.com/cve/CVE-2022-0851                               |       CVE-2022-0175   1.7     https://vulners.com/cve/CVE-2022-0175                               |       CVE-2022-0171   1.7     https://vulners.com/cve/CVE-2022-0171                               |       CVE-2021-3997   1.7     https://vulners.com/cve/CVE-2021-3997                               |       CVE-2021-3669   1.7     https://vulners.com/cve/CVE-2021-3669                               |       CVE-2022-0168   1.4     https://vulners.com/cve/CVE-2022-0168                               |       CVE-2021-4159   1.4     https://vulners.com/cve/CVE-2021-4159                               |       CVE-2019-2536   1.2     https://vulners.com/cve/CVE-2019-2536                               |       SMNTC-111467    0.0     https://vulners.com/symantec/SMNTC-111467                           |       SMNTC-111446    0.0     https://vulners.com/symantec/SMNTC-111446                           |       SMNTC-111409    0.0     https://vulners.com/symantec/SMNTC-111409                           |       SMNTC-111311    0.0     https://vulners.com/symantec/SMNTC-111311                           |       SMNTC-111210    0.0     https://vulners.com/symantec/SMNTC-111210                           |       SMNTC-111183    0.0     https://vulners.com/symantec/SMNTC-111183                           |       SMNTC-111133    0.0     https://vulners.com/symantec/SMNTC-111133                           |       SMNTC-111003    0.0     https://vulners.com/symantec/SMNTC-111003                           |       SMNTC-111000    0.0     https://vulners.com/symantec/SMNTC-111000                           |       SMNTC-110990    0.0     https://vulners.com/symantec/SMNTC-110990                           |       SMNTC-110972    0.0     https://vulners.com/symantec/SMNTC-110972\n|       SMNTC-110967    0.0     https://vulners.com/symantec/SMNTC-110967\n|       SMNTC-110965    0.0     https://vulners.com/symantec/SMNTC-110965\n|       SMNTC-110941    0.0     https://vulners.com/symantec/SMNTC-110941\n|       SMNTC-110846    0.0     https://vulners.com/symantec/SMNTC-110846\n|       SMNTC-110842    0.0     https://vulners.com/symantec/SMNTC-110842                           |       SMNTC-110841    0.0     https://vulners.com/symantec/SMNTC-110841                           |       SMNTC-110803    0.0     https://vulners.com/symantec/SMNTC-110803\n|       SMNTC-110579    0.0     https://vulners.com/symantec/SMNTC-110579\n|       SMNTC-110577    0.0     https://vulners.com/symantec/SMNTC-110577\n|       SMNTC-110422    0.0     https://vulners.com/symantec/SMNTC-110422\n|       PACKETSTORM:152266      0.0     https://vulners.com/packetstorm/PACKETSTORM:152266        *EXPLOIT*                                           |       PACKETSTORM:152251      0.0     https://vulners.com/packetstorm/PACKETSTORM:152251        *EXPLOIT*\n|       MSF:EXPLOIT-LINUX-LOCAL-RDS_ATOMIC_FREE_OP_NULL_POINTER_DEREF_PRIV_ESC-   0.0     https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-LOCAL-RDS_ATOMIC_FREE_OP_NULL_POINTER_DEREF_PRIV_ESC-      *EXPLOIT*                                           |       MSF:EXPLOIT-LINUX-LOCAL-PTRACE_TRACEME_PKEXEC_HELPER-     0.0     https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-LOCAL-PTRACE_TRACEME_PKEXEC_HELPER-        *EXPLOIT*                         |_      AC8391C6-9C7C-562A-A523-E925BC4005C3    0.0       https://vulners.com/githubexploit/AC8391C6-9C7C-562A-A523-E925BC4005C3    *EXPLOIT*", "creation_timestamp": "2023-11-15T16:53:04.000000Z"}, {"uuid": "02a85d1f-f693-419b-af34-bfe2bcd52eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3669", "type": "seen", "source": "https://t.me/cibsecurity/48897", "content": "\u203c CVE-2021-3669 \u203c\n\nA flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T20:30:32.000000Z"}, {"uuid": "8dec5180-cab8-41f0-9edf-d374028c8f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36698", "type": "seen", "source": "https://t.me/cibsecurity/31719", "content": "\u203c CVE-2021-36698 \u203c\n\nPandora FMS through 755 allows XSS via a new Event Filter with a crafted name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T15:23:12.000000Z"}, {"uuid": "be47e6eb-63d9-4667-b74e-12915924495c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36697", "type": "seen", "source": "https://t.me/cibsecurity/31718", "content": "\u203c CVE-2021-36697 \u203c\n\nWith an admin account, the .htaccess file in Artica Pandora FMS &lt;=755 can be overwritten with the File Manager component. The new .htaccess file contains a Rewrite Rule with a type definition. A normal PHP file can be uploaded with this new \"file type\" and the code can be executed with an HTTP request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T15:23:10.000000Z"}, {"uuid": "7ca24c98-8bdb-454d-ac44-96546d7b7594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36695", "type": "seen", "source": "https://t.me/cibsecurity/28428", "content": "\u203c CVE-2021-36695 \u203c\n\nDeskpro cloud and on-premise Deskpro 2021.1.6 and fixed in Deskpro 2021.1.7 contains a cross-site scripting (XSS) vulnerability in the download file feature on a manager profile due to lack of input validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T16:28:34.000000Z"}, {"uuid": "24126b4c-be95-4a95-afe3-feeede042605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36691", "type": "seen", "source": "https://t.me/cibsecurity/28052", "content": "\u203c CVE-2021-36691 \u203c\n\nlibjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T00:32:45.000000Z"}, {"uuid": "607196ef-d7b2-4fd3-899f-c113c1ab49db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36692", "type": "seen", "source": "https://t.me/cibsecurity/28051", "content": "\u203c CVE-2021-36692 \u203c\n\nlibjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T00:32:44.000000Z"}, {"uuid": "d340284d-505c-4429-aace-7bd600bbfe25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-36690", "type": "seen", "source": "https://t.me/cibsecurity/27775", "content": "\u203c CVE-2021-36690 \u203c\n\nSegmentation fault vulnerability in SQLite sqlite3 3.36.0 via the idxGetTableInfo function, in which a crafted SQL query can cause a denial of service\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-24T18:23:30.000000Z"}]}