{"vulnerability": "CVE-2021-4065", "sightings": [{"uuid": "ef98015a-6465-4ba4-a88c-2015dfec085c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-05-16T18:10:04.000000Z"}, {"uuid": "03fb6c7a-3ded-4193-b744-4bbaf9bddb4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:54.000000Z"}, {"uuid": "38193609-2f2f-4d6b-92e3-ed1075b8ca2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lr4r5p23oc2e", "content": "", "creation_timestamp": "2025-06-08T21:02:19.348815Z"}, {"uuid": "74b52084-6eb4-46e0-a5fd-d4bbe2c6917e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-40655.yaml", "content": "", "creation_timestamp": "2025-06-04T12:31:23.000000Z"}, {"uuid": "83b4ace0-25a3-4fb4-9c94-f58e38602248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:27.000000Z"}, {"uuid": "e0353cf0-acd7-47a4-aa11-2996b9b9dca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-40655", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/6695f47b-f1c5-4151-bf40-31d885d1dfca", "content": "", "creation_timestamp": "2026-02-02T12:26:36.831505Z"}, {"uuid": "f4fecac8-ea91-41c8-ab30-3d9b2eb6a3c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40656", "type": "seen", "source": "https://t.me/cibsecurity/40388", "content": "\u203c CVE-2021-40656 \u203c\n\nlibsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-08T20:16:13.000000Z"}, {"uuid": "71537a84-a41a-4006-8863-d95ef9ad6d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40651", "type": "seen", "source": "https://t.me/cibsecurity/29635", "content": "\u203c CVE-2021-40651 \u203c\n\nOS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T16:36:48.000000Z"}, {"uuid": "ec16ed12-be4f-47bd-a3b2-998b6f86e86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40654", "type": "seen", "source": "https://t.me/cibsecurity/29409", "content": "\u203c CVE-2021-40654 \u203c\n\nAn information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-25T00:31:08.000000Z"}, {"uuid": "ebc1a112-78d5-4e04-9c9d-8231624b04e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "seen", "source": "https://t.me/cibsecurity/29408", "content": "\u203c CVE-2021-40655 \u203c\n\nAn informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-25T00:31:07.000000Z"}, {"uuid": "75fc84ea-6393-4757-a479-bc96e1669152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-40655", "type": "exploited", "source": "https://t.me/thehackernews/4970", "content": "\ud83d\udea8 Attention D-Link users - CISA warns of actively exploited vulnerabilities, CVE-2014-100005 and CVE-2021-40655, that attackers could exploit to change your router settings or steal your credentials. \n \nLearn more: https://thehackernews.com/2024/05/cisa-warns-of-actively-exploited-d-link.html", "creation_timestamp": "2024-05-17T09:20:58.000000Z"}]}