{"vulnerability": "CVE-2021-3842", "sightings": [{"uuid": "28eab634-0650-4c2e-97b8-b5c379d73734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38427", "type": "seen", "source": "Telegram/z530aXtXmzenL9kPPAK-ONFc0yaFDbqfhSACDvJ4yl6XD5xC", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}, {"uuid": "9ca4e22c-3dc2-4b4f-ade7-8091bc273327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3842", "type": "seen", "source": "https://bsky.app/profile/clayton256.bsky.social/post/3ll43cikdp625", "content": "", "creation_timestamp": "2025-03-24T06:00:07.622077Z"}, {"uuid": "b4ed9b13-c525-497a-b2e4-f9445508bbc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38424", "type": "seen", "source": "https://t.me/cibsecurity/31793", "content": "\u203c CVE-2021-38424 \u203c\n\nThe tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T23:23:51.000000Z"}, {"uuid": "16eef997-4492-4ccf-840c-7f2873b52add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38423", "type": "seen", "source": "https://t.me/cibsecurity/42019", "content": "\u203c CVE-2021-38423 \u203c\n\nAll versions of GurumDDS improperly calculate the size to be used when allocating the buffer, which may result in a buffer overflow.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T20:36:54.000000Z"}, {"uuid": "df6a873b-3515-4a38-93af-eee086fc5f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38427", "type": "seen", "source": "https://t.me/cibsecurity/42009", "content": "\u203c CVE-2021-38427 \u203c\n\nRTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T20:36:43.000000Z"}, {"uuid": "5d5b4d10-5652-40fd-b1b5-3eb264e725d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38429", "type": "seen", "source": "https://t.me/cibsecurity/42007", "content": "\u203c CVE-2021-38429 \u203c\n\nOCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T20:36:40.000000Z"}, {"uuid": "91c15735-b80e-4bbb-b1ee-8b7ca5ef17a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3842", "type": "seen", "source": "https://t.me/cibsecurity/34939", "content": "\u203c CVE-2021-3842 \u203c\n\nnltk is vulnerable to Inefficient Regular Expression Complexity\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-04T18:39:38.000000Z"}, {"uuid": "a3c5443b-e535-49bd-ab36-30c604eb865d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38420", "type": "seen", "source": "https://t.me/cibsecurity/31777", "content": "\u203c CVE-2021-38420 \u203c\n\nDelta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T23:23:28.000000Z"}, {"uuid": "5c1fba89-af64-44cb-ada2-8d76b614d976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38422", "type": "seen", "source": "https://t.me/cibsecurity/31778", "content": "\u203c CVE-2021-38422 \u203c\n\nDelta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T23:23:29.000000Z"}, {"uuid": "86e92924-56d2-4f73-9f7f-df7735a74e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38426", "type": "seen", "source": "https://t.me/cibsecurity/30684", "content": "\u203c CVE-2021-38426 \u203c\n\nFATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-18T16:32:02.000000Z"}]}