{"vulnerability": "CVE-2021-3984", "sightings": [{"uuid": "9644ec52-ae54-42b7-90d6-3c6ea9c14b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39843", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:18.000000Z"}, {"uuid": "1beda80a-6358-45fb-a7bb-b49bc46b950f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39840", "type": "seen", "source": "https://t.me/arpsyndicate/182", "content": "#ExploitObserverAlert\n\nCVE-2021-39840\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2021-39840. Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForms that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nFIRST-EPSS: 0.365760000\nNVD-IS: 6.4\nNVD-ES: 8.6", "creation_timestamp": "2023-11-17T02:43:04.000000Z"}, {"uuid": "31c86258-a2e0-4605-bf8a-e07078fde15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3984", "type": "seen", "source": "https://t.me/cibsecurity/33184", "content": "\u203c CVE-2021-3984 \u203c\n\nvim is vulnerable to Heap-based Buffer Overflow\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-01T14:35:44.000000Z"}, {"uuid": "308a8279-1262-48b4-90aa-0d70822f9b2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39847", "type": "seen", "source": "https://t.me/cibsecurity/28169", "content": "\u203c CVE-2021-39847 \u203c\n\nXMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-01T18:35:26.000000Z"}, {"uuid": "7570ca89-c94f-483f-8339-1f03db53e5fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39845", "type": "seen", "source": "https://t.me/cibsecurity/29664", "content": "\u203c CVE-2021-39845 \u203c\n\nAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T20:37:18.000000Z"}, {"uuid": "d960c401-6ffd-432d-9220-154e0a705b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39841", "type": "seen", "source": "https://t.me/cibsecurity/29668", "content": "\u203c CVE-2021-39841 \u203c\n\nAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T20:37:23.000000Z"}, {"uuid": "7f94b5fd-7757-4c9b-8b1e-bad077039fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39846", "type": "seen", "source": "https://t.me/cibsecurity/29652", "content": "\u203c CVE-2021-39846 \u203c\n\nAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T20:37:03.000000Z"}, {"uuid": "8a53929c-df89-414f-8ae4-3383bdf29905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39840", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4575", "content": "#exploit\nCVE-2021-28632, CVE-2021-39840:\nBypassing Locks in Adobe Reader\nhttps://www.zerodayinitiative.com/blog/2021/10/20/cve-2021-28632-amp-cve-2021-39840-bypassing-locks-in-adobe-reader", "creation_timestamp": "2021-10-22T11:03:01.000000Z"}]}