{"vulnerability": "CVE-2021-3749", "sightings": [{"uuid": "72223920-ef30-4b42-9563-4f0fb8159116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37491", "type": "seen", "source": "https://t.me/cibsecurity/57659", "content": "\u203c CVE-2021-37491 \u203c\n\nAn issue discovered in src/wallet/wallet.cpp in Dogecoin Project Dogecoin Core 1.14.3 and earlier allows attackers to view sensitive information via CWallet::CreateTransaction() function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-07T16:24:04.000000Z"}, {"uuid": "701d1f43-045f-41a0-908f-851dcae492f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37497", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10573", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-37497\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL injection vulnerability in route of PbootCMS 3.0.5 allows remote attackers to run arbitrary SQL commands via crafted GET request.\n\ud83d\udccf Published: 2023-02-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-04T20:39:01.865Z\n\ud83d\udd17 References:\n1. https://www.pbootcms.com/\n2. https://github.com/penson233/Vuln/issues/3", "creation_timestamp": "2025-04-04T21:36:30.000000Z"}, {"uuid": "968bd48c-8925-49a4-ada6-cec6ff54aea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3749", "type": "seen", "source": "https://t.me/cibsecurity/28070", "content": "\u203c CVE-2021-3749 \u203c\n\naxios is vulnerable to Inefficient Regular Expression Complexity\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T14:33:28.000000Z"}, {"uuid": "d5599e42-e7a0-4ee2-894a-8fa23b66d2cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37498", "type": "seen", "source": "https://t.me/cibsecurity/56751", "content": "\u203c CVE-2021-37498 \u203c\n\nAn SSRF issue was discovered in Reprise License Manager (RLM) web interface through 14.2BL4 that allows remote attackers to trigger outbound requests to intranet servers, conduct port scans via the actserver parameter in License Activation function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-20T14:26:48.000000Z"}, {"uuid": "043e317a-0214-4e88-afda-37e9f9fa1738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37499", "type": "seen", "source": "https://t.me/cibsecurity/56749", "content": "\u203c CVE-2021-37499 \u203c\n\nCRLF vulnerability in Reprise License Manager (RLM) web interface through 14.2BL4 in the password parameter in View License Result function, that allows remote attackers to inject arbitrary HTTP headers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-20T14:26:46.000000Z"}, {"uuid": "cdf802cd-7fa4-4ed6-a228-8e31b975c959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37492", "type": "seen", "source": "https://t.me/cibsecurity/57702", "content": "\u203c CVE-2021-37492 \u203c\n\nAn issue discovered in src/wallet/wallet.cpp in Ravencoin Core 4.3.2.1 and earlier allows attackers to view sensitive information via CWallet::CreateTransactionAll() function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T00:24:10.000000Z"}]}