{"vulnerability": "CVE-2021-3779", "sightings": [{"uuid": "de963419-05e0-471f-9558-594da352be20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37791", "type": "seen", "source": "https://t.me/cibsecurity/45426", "content": "\u203c CVE-2021-37791 \u203c\n\nMyAdmin v1.0 is affected by an incorrect access control vulnerability in viewing personal center in /api/user/userData?userCode=admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T20:38:54.000000Z"}, {"uuid": "1a785ea9-d523-4269-8035-e4eaa1c55ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3779", "type": "seen", "source": "https://t.me/cibsecurity/45313", "content": "\u203c CVE-2021-3779 \u203c\n\nA malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-28T20:36:11.000000Z"}, {"uuid": "b1496fd0-6820-4b8b-a21b-b153d74493e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37794", "type": "seen", "source": "https://t.me/cibsecurity/28132", "content": "\u203c CVE-2021-37794 \u203c\n\nA stored cross-site scripting (XSS) vulnerability exists in FileBrowser &lt; v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-31T22:33:42.000000Z"}]}