{"vulnerability": "CVE-2021-3760", "sightings": [{"uuid": "8233e491-c226-4b29-9add-1d994a51e2a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3760", "type": "seen", "source": "https://t.me/cibsecurity/37618", "content": "\u203c CVE-2021-3760 \u203c\n\nA flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-16T22:36:15.000000Z"}, {"uuid": "38f0e781-677a-4adc-8d2e-162d3f2ed710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37608", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/509", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBackporting CVE-2021-1748 patch for iOS &lt;=14.3\nURL\uff1ahttps://github.com/AlAIAL90/CVE-2021-37608", "creation_timestamp": "2021-09-03T22:57:29.000000Z"}, {"uuid": "3d07188f-e9ad-4e62-b9d7-7563ac01ed6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37605", "type": "seen", "source": "https://t.me/cibsecurity/26888", "content": "\u203c CVE-2021-37605 \u203c\n\nIn the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-05T20:31:25.000000Z"}, {"uuid": "f53397b1-a098-414e-af36-03d11da83aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37604", "type": "seen", "source": "https://t.me/cibsecurity/26885", "content": "\u203c CVE-2021-37604 \u203c\n\nIn the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being validated/updated prior to message authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-05T20:31:22.000000Z"}, {"uuid": "3f296c80-b4a7-4247-bff9-e502fe7be85b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37600", "type": "seen", "source": "https://t.me/cibsecurity/26618", "content": "\u203c CVE-2021-37600 \u203c\n\nAn integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:21:30.000000Z"}, {"uuid": "f15f7ab2-1d30-4f64-9fe7-33959c778bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37606", "type": "seen", "source": "https://t.me/cibsecurity/26617", "content": "\u203c CVE-2021-37606 \u203c\n\nMeow hash 0.5/calico does not sufficiently thwart key recovery by an attacker who can query whether there's a collision in the bottom bits of the hashes of two messages, as demonstrated by an attack against a long-running web service that allows the attacker to infer collisions by measuring timing differences.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:21:29.000000Z"}, {"uuid": "89e6f2ca-df9c-474e-9c05-cb9603b9ee18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37601", "type": "seen", "source": "https://t.me/cibsecurity/26613", "content": "\u203c CVE-2021-37601 \u203c\n\nmuc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-30T18:21:24.000000Z"}]}