{"vulnerability": "CVE-2021-3757", "sightings": [{"uuid": "1c9f0280-e7fb-4641-bb4e-7e4beb98a6d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37577", "type": "seen", "source": "https://t.me/cvedetector/6762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-37577 - Bluetooth Passkey Reflection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2021-37577 \nPublished : Oct. 1, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : Bluetooth LE and BR/EDR Secure Connections pairing and Secure Simple Pairing using the Passkey entry protocol in Bluetooth Core Specifications 2.1 through 5.3 may permit an unauthenticated man-in-the-middle attacker to identify the Passkey used during pairing by reflection of a crafted public key with the same X coordinate as the offered public key and by reflection of the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. This is a related issue to CVE-2020-26558. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T17:45:54.000000Z"}, {"uuid": "39fd45d9-ef74-4668-aee2-cfcd439f1498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37579", "type": "seen", "source": "https://t.me/arpsyndicate/3194", "content": "#ExploitObserverAlert\n\nCVE-2021-37579\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.\n\nFIRST-EPSS: 0.600670000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T03:58:49.000000Z"}, {"uuid": "37f4f959-14fa-4927-b739-f810cd4d5c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37579", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4326", "content": "#exploit\n1. CVE-2021-37579:\nPre-Auth Unsafe Java Deserialization in Apace Dubbo\nhttps://securitylab.github.com/advisories/GHSL-2021-097-apache-dubbo\n\n2. macOS 11.5.2/iOS 14.7.1 Kernel Race Condition PoC\nhttps://gist.github.com/infernalheaven/f2f6a2fa2ec1b2252955fb8078211da1", "creation_timestamp": "2021-09-18T13:45:14.000000Z"}, {"uuid": "306b3afe-fe65-4973-b4cb-561064f6802e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37572", "type": "seen", "source": "https://t.me/cibsecurity/34620", "content": "\u203c CVE-2021-37572 \u203c\n\nMediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-26T02:22:14.000000Z"}, {"uuid": "cc4714ad-9636-475a-a7db-ac8fc5c0b044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37570", "type": "seen", "source": "https://t.me/cibsecurity/34617", "content": "\u203c CVE-2021-37570 \u203c\n\nMediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-26T02:22:10.000000Z"}, {"uuid": "354ef421-cd55-4271-ae58-3306c2756b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37571", "type": "seen", "source": "https://t.me/cibsecurity/34616", "content": "\u203c CVE-2021-37571 \u203c\n\nMediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-26T02:22:08.000000Z"}, {"uuid": "d28d4a14-48b0-42f3-9ed8-58127d37fbc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3757", "type": "seen", "source": "https://t.me/cibsecurity/28210", "content": "\u203c CVE-2021-3757 \u203c\n\nimmer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T16:36:04.000000Z"}, {"uuid": "73f6315f-e5dd-47c1-a294-b948f9991066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37578", "type": "seen", "source": "https://t.me/cibsecurity/26563", "content": "\u203c CVE-2021-37578 \u203c\n\nApache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-29T12:14:09.000000Z"}, {"uuid": "e3e824bd-e490-4ec7-820a-737ce5a99cb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37573", "type": "seen", "source": "https://t.me/cibsecurity/27014", "content": "\u203c CVE-2021-37573 \u203c\n\nA reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) &lt;=1.115 allows an adversary to inject malicious code on the server's \"404 Page not Found\" error page\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T16:37:02.000000Z"}, {"uuid": "23699697-8812-45e2-9c95-4472b90b810f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37576", "type": "seen", "source": "https://t.me/cibsecurity/26534", "content": "\u203c CVE-2021-37576 \u203c\n\narch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-27T02:11:46.000000Z"}, {"uuid": "562f6032-8180-4ed1-aaae-89eb333dc453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37572", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4816", "content": "#WLAN_Security\nBlackHat Europe 2021:\n\"New Attack Surfaces of Wi-Fi Mesh Network\".\n\n// CVE-2021-35055, CVE-2021-37566, CVE-2021-37572", "creation_timestamp": "2021-11-23T11:01:25.000000Z"}]}