{"vulnerability": "CVE-2021-3838", "sightings": [{"uuid": "0002a32e-4ead-4968-96de-078db568336a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3838", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113486597726053603", "content": "", "creation_timestamp": "2024-11-15T10:54:16.712814Z"}, {"uuid": "dca7779b-0cca-457e-bcfe-5f417ca7ce38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38389", "type": "seen", "source": "https://t.me/cibsecurity/30680", "content": "\u203c CVE-2021-38389 \u203c\n\nAdvantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-18T16:31:55.000000Z"}, {"uuid": "e83298bd-b33e-4c50-bfcb-3f574db30cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3838", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mb7rfvcyzk2b", "content": "", "creation_timestamp": "2025-12-30T16:28:13.138945Z"}, {"uuid": "7f932abc-c312-418b-b9c7-6aa707d8be85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38384", "type": "seen", "source": "https://t.me/arpsyndicate/1692", "content": "#ExploitObserverAlert\n\nCVE-2021-38384\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2021-38384. Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing / character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greater than expected permissions).\n\nFIRST-EPSS: 0.004200000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-11T03:15:19.000000Z"}, {"uuid": "84e3ea92-969c-411a-a2b7-894894068474", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38385", "type": "seen", "source": "https://t.me/cibsecurity/27997", "content": "\u203c CVE-2021-38385 \u203c\n\nTor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-30T12:32:13.000000Z"}, {"uuid": "4a0fd903-fb64-408b-a8b1-91183749ff72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38388", "type": "seen", "source": "https://t.me/cibsecurity/28529", "content": "\u203c CVE-2021-38388 \u203c\n\nCentral Dogma allows privilege escalation with mirroring to the internal dogma repository that has a file managing the authorization of the project.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T22:28:37.000000Z"}]}