{"vulnerability": "CVE-2021-3875", "sightings": [{"uuid": "6b23faf9-a599-4189-bc05-6fbbea8afe37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3875", "type": "seen", "source": "https://t.me/cibsecurity/30645", "content": "\u203c CVE-2021-3875 \u203c\n\nvim is vulnerable to Heap-based Buffer Overflow\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-15T18:28:58.000000Z"}, {"uuid": "d1fad645-37de-4927-b818-02b092fffea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38759", "type": "seen", "source": "https://t.me/poxek/274", "content": "Raspberry Pi 5.10 \u2014 Default Credentials Vulnerability \nCVE-2021-38759 \ud83d\udc81\u200d\u2640\ufe0f\n\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a \n\n@dnevnik_infosec", "creation_timestamp": "2021-12-18T15:41:23.000000Z"}, {"uuid": "9e8d9ce5-23b6-427e-bb96-ba5c7bc3afd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38753", "type": "seen", "source": "https://t.me/cibsecurity/27384", "content": "\u203c CVE-2021-38753 \u203c\n\nAn unrestricted file upload on Simple Image Gallery Web App can be exploited to upload a web shell and executed to gain unauthorized access to the server hosting the web app.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:59.000000Z"}, {"uuid": "24fce465-d0b0-4446-ad13-01efb38b4340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38759", "type": "seen", "source": "https://t.me/cibsecurity/33535", "content": "\u203c CVE-2021-38759 \u203c\n\nRaspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T00:23:14.000000Z"}, {"uuid": "828eba0c-6472-43eb-a2e6-afa0e2b89fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38752", "type": "seen", "source": "https://t.me/cibsecurity/27383", "content": "\u203c CVE-2021-38752 \u203c\n\nA cross-site scripting (XSS) vulnerability in Online Catering Reservation System using PHP on Sourcecodester allows an attacker to arbitrarily inject code in the search bar.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:57.000000Z"}, {"uuid": "e863dfe2-921b-4c60-94bd-b51e6a3a51d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38757", "type": "seen", "source": "https://t.me/cibsecurity/27382", "content": "\u203c CVE-2021-38757 \u203c\n\nPersistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through contact.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:55.000000Z"}, {"uuid": "92db17b9-c8fe-4349-963f-b2ab7f044a01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38755", "type": "seen", "source": "https://t.me/cibsecurity/27381", "content": "\u203c CVE-2021-38755 \u203c\n\nUnauthenticated doctor entry deletion in Hospital Management System in admin-panel1.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:54.000000Z"}, {"uuid": "e42c2a86-6e18-4110-b156-7fe5ec15918b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38754", "type": "seen", "source": "https://t.me/cibsecurity/27380", "content": "\u203c CVE-2021-38754 \u203c\n\nSQL Injection vulnerability in Hospital Management System due to lack of input validation in messearch.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:52.000000Z"}, {"uuid": "5d6c5d97-95be-4c8e-8520-e68dad6b0c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38756", "type": "seen", "source": "https://t.me/cibsecurity/27379", "content": "\u203c CVE-2021-38756 \u203c\n\nPersistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through prescribe.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:14:50.000000Z"}, {"uuid": "1c18b6db-19e9-4778-98fe-c53695028a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38758", "type": "seen", "source": "https://t.me/cibsecurity/27386", "content": "\u203c CVE-2021-38758 \u203c\n\nDirectory traversal in Online Catering Reservation System due to lack of validation in index.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:15:03.000000Z"}, {"uuid": "1ec8a836-c03f-487c-8f2a-e419b2669d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-38751", "type": "seen", "source": "https://t.me/cibsecurity/27385", "content": "\u203c CVE-2021-38751 \u203c\n\nA HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T18:15:01.000000Z"}]}