{"vulnerability": "CVE-2021-4102", "sightings": [{"uuid": "1e884fb2-c414-41d1-aba3-1e810544f10d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "c35df52d-199b-4d3d-a09f-a9692005ff1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971194", "content": "", "creation_timestamp": "2024-12-24T20:25:41.129902Z"}, {"uuid": "d2aecca4-2a7a-4c93-b72c-d378b523fb9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:32.000000Z"}, {"uuid": "3b1b5e2a-5cc8-4337-ab3f-cd114e909f1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=702", "content": "", "creation_timestamp": "2021-12-14T04:00:00.000000Z"}, {"uuid": "ebc11c10-1a21-4167-9b0e-bdcd979c68fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=704", "content": "", "creation_timestamp": "2021-12-15T04:00:00.000000Z"}, {"uuid": "49eb86b2-4af5-40f5-bc48-741eed168f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c8327794-c21c-45a6-b16e-00b6b3ec67e0", "content": "", "creation_timestamp": "2026-02-02T12:28:30.616190Z"}, {"uuid": "a6a80af6-96b6-4180-9a52-bca8e3b3dd18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://t.me/shankar_apk7/370", "content": "\u062a\u062d\u0630\u064a\u0631 \u26a0: \u064a\u064f\u0646\u0635\u062d \u0645\u0633\u062a\u062e\u062f\u0645\u0648 Chrome \u0628\u0634\u062f\u0629  \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0625\u0644\u0649 \u0623\u062d\u062f\u062b \u0625\u0635\u062f\u0627\u0631 \u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0644\u0623\u0646\u0638\u0645\u0629 Windows \u0648 Mac \u0648 Linux  \n\u0648\u0630\u0627\u0644\u0643 \u0628\u0639\u062f \u0627\u0646  \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0629 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062a\u064a \u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly", "creation_timestamp": "2021-12-23T19:52:11.000000Z"}, {"uuid": "aea0d588-02c1-448e-be2e-cc5faf140af4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://t.me/shankar_apk7/369", "content": "\u062a\u062d\u0630\u064a\u0631 \u26a0: \u064a\u064f\u0646\u0635\u062d \u0645\u0633\u062a\u062e\u062f\u0645\u0648 Chrome \u0628\u0634\u062f\u0629  \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0625\u0644\u0649 \u0623\u062d\u062f\u062b \u0625\u0635\u062f\u0627\u0631 \u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0644\u0623\u0646\u0638\u0645\u0629 Windows \u0648 Mac \u0648 Linux  \n\u0648\u0630\u0627\u0644\u0643 \u0628\u0639\u062f \u0627\u0646  \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0629 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062a\u064a \u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly", "creation_timestamp": "2021-12-23T19:23:59.000000Z"}, {"uuid": "81e4851a-3dff-44d8-9ab3-49fd3bd88449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/anwar1213xx/1508", "content": "\u062d\u062f\u062b\u0648\u0627 \u062a\u0637\u0628\u064a\u0642 \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u062d\u0627\u0644\u0627 ...\n \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0647 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly\n\u0648\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0627\u0646 ....\n\u062c\u0648\u062c\u0644 \u062a\u0633\u0648\u064a \u0631\u0642\u0645 \u0642\u064a\u0627\u0633\u064a \u0641\u064a \u0625\u0644\u063a\u0627\u0621 17\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d \u062e\u0644\u0627\u0644 \u0627\u0644\u0639\u0627\u0645\ud83d\udd25", "creation_timestamp": "2021-12-14T10:07:09.000000Z"}, {"uuid": "973b9227-b6b0-4af3-ac7d-8633fbdd6048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/piratesofyemen/352", "content": "\u062d\u062f\u062b\u0648\u0627 \u062a\u0637\u0628\u064a\u0642 \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u062d\u0627\u0644\u0627 ...\n \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0647 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly\n\u0648\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0627\u0646 ....\n\u062c\u0648\u062c\u0644 \u062a\u0633\u0648\u064a \u0631\u0642\u0645 \u0642\u064a\u0627\u0633\u064a \u0641\u064a \u0625\u0644\u063a\u0627\u0621 17\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d \u062e\u0644\u0627\u0644 \u0627\u0644\u0639\u0627\u0645\ud83d\udd25", "creation_timestamp": "2021-12-14T10:07:09.000000Z"}, {"uuid": "0d99307c-ef96-4548-811c-fe57b760a02b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/piratesofyemen1213/190", "content": "\u062d\u062f\u062b\u0648\u0627 \u062a\u0637\u0628\u064a\u0642 \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u062d\u0627\u0644\u0627 ...\n \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0647 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly\n\u0648\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0627\u0646 ....\n\u062c\u0648\u062c\u0644 \u062a\u0633\u0648\u064a \u0631\u0642\u0645 \u0642\u064a\u0627\u0633\u064a \u0641\u064a \u0625\u0644\u063a\u0627\u0621 17\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d \u062e\u0644\u0627\u0644 \u0627\u0644\u0639\u0627\u0645\ud83d\udd25", "creation_timestamp": "2021-12-14T10:07:09.000000Z"}, {"uuid": "5895dad4-53f6-4c06-94a2-e1b497c5a99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://t.me/Spider_Cyber_Team/250", "content": "\u062a\u062d\u0630\u064a\u0631 \u26a0: \u064a\u064f\u0646\u0635\u062d \u0645\u0633\u062a\u062e\u062f\u0645\u0648 Chrome \u0628\u0634\u062f\u0629  \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0625\u0644\u0649 \u0623\u062d\u062f\u062b \u0625\u0635\u062f\u0627\u0631 \u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0644\u0623\u0646\u0638\u0645\u0629 Windows \u0648 Mac \u0648 Linux  \n\u0648\u0630\u0627\u0644\u0643 \u0628\u0639\u062f \u0627\u0646  \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0629 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062a\u064a \u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly", "creation_timestamp": "2022-12-03T18:02:40.000000Z"}, {"uuid": "b27396d9-848c-49c5-ba2e-232c83b24a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/MH_HACKING_termux/87", "content": "\u062d\u062f\u062b\u0648\u0627 \u062a\u0637\u0628\u064a\u0642 \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u062d\u0627\u0644\u0627 ...\n \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0647 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly\n\u0648\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0627\u0646 ....\n\u062c\u0648\u062c\u0644 \u062a\u0633\u0648\u064a \u0631\u0642\u0645 \u0642\u064a\u0627\u0633\u064a \u0641\u064a \u0625\u0644\u063a\u0627\u0621 17\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d \u062e\u0644\u0627\u0644 \u0627\u0644\u0639\u0627\u0645\ud83d\udd25", "creation_timestamp": "2021-12-14T10:00:24.000000Z"}, {"uuid": "058d7c98-c2ac-419e-add4-baabb3737c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "seen", "source": "https://t.me/Spider_Team00/627", "content": "\u062a\u062d\u0630\u064a\u0631 \u26a0: \u064a\u064f\u0646\u0635\u062d \u0645\u0633\u062a\u062e\u062f\u0645\u0648 Chrome \u0628\u0634\u062f\u0629  \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062b \u0625\u0644\u0649 \u0623\u062d\u062f\u062b \u0625\u0635\u062f\u0627\u0631 \u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0644\u0623\u0646\u0638\u0645\u0629 Windows \u0648 Mac \u0648 Linux  \n\u0648\u0630\u0627\u0644\u0643 \u0628\u0639\u062f \u0627\u0646  \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0629 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062a\u064a \u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly", "creation_timestamp": "2022-10-27T21:48:22.000000Z"}, {"uuid": "8d22444d-1ff1-4e49-9339-04e51c7ae976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/true_secator/2439", "content": "\u041f\u043e\u0434 \u0448\u0443\u043c\u043e\u043a log4shell \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0440\u0435\u0448\u0438\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Chrome.\n \n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome 96.0.4664.110 \u0441\u0442\u0430\u043b\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0434\u043b\u044f Windows, Mac \u0438 Linux \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0443\u0437\u043d\u0430\u043b\u0438 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2021-4102 \u0443\u0436\u0435 \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u0438 \u043d\u0430\u0447\u0430\u043b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0434\u043b\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435:\n \n- \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2021-4098 (\u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 Mojo, \u0430\u0432\u0442\u043e\u0440: \u0421\u0435\u0440\u0433\u0435\u0439 \u0413\u043b\u0430\u0437\u0443\u043d\u043e\u0432 \u0438\u0437 Google Project Zero)\n- \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2021-4099 (\u043e\u0448\u0438\u0431\u043a\u0430 \u0432 Swiftshader, \u0430\u0432\u0442\u043e\u0440: \u0410\u043a\u0438 \u0425\u0435\u043b\u0438\u043d \u0438\u0437 Solita)\n- \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2021-4100 (\u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0436\u0438\u0437\u043d\u0435\u043d\u043d\u043e\u0433\u043e \u0446\u0438\u043a\u043b\u0430 \u043e\u0431\u044a\u0435\u043a\u0442\u0430 \u0432 ANGLE, \u0430\u0432\u0442\u043e\u0440: \u0410\u043a\u0438 \u0425\u0435\u043b\u0438\u043d \u0438\u0437 Solita)\n- \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2021-4101 (\u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 Swiftshader, \u0430\u0432\u0442\u043e\u0440: \u0410\u0431\u0440\u0430\u0440\u0443\u0434\u0434\u0438\u043d \u0425\u0430\u043d \u0438 \u041e\u043c\u0430\u0439\u0440).\n \nCVE-2021-4102 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript Chrome V8 \u0438 WebAssembly, \u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445. Google \u043e\u0442\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u043e\u0442 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044f \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0439 \u0434\u044b\u0440\u043e\u0439.\n \n\u0412 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u044d\u0442\u043e \u0443\u0436\u0435 17-\u0430\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f Google 0-day \u0432 Chrome, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Google Chrome \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043d\u043e \u0441\u0442\u0430\u043d\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c.", "creation_timestamp": "2021-12-14T13:04:00.000000Z"}, {"uuid": "8c04aa82-1b3b-4600-b83a-c3760cf58d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41020", "type": "seen", "source": "https://t.me/cibsecurity/41933", "content": "\u203c CVE-2021-41020 \u203c\n\nAn improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T20:35:16.000000Z"}, {"uuid": "28504ea5-87c5-41fa-af2b-073086b56a15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41026", "type": "seen", "source": "https://t.me/cibsecurity/40249", "content": "\u203c CVE-2021-41026 \u203c\n\nA relative path traversal in FortiWeb versions 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-06T20:30:33.000000Z"}, {"uuid": "dd352df4-e76c-42c0-8820-4f77936e981e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41028", "type": "seen", "source": "https://t.me/cibsecurity/34168", "content": "\u203c CVE-2021-41028 \u203c\n\nA combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-16T22:36:12.000000Z"}, {"uuid": "6e3b8a54-ec95-46a2-b66d-4cc2feedf893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41027", "type": "seen", "source": "https://t.me/cibsecurity/33583", "content": "\u203c CVE-2021-41027 \u203c\n\nA stack-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, allows an authenticated attacker to execute unauthorized code or commands via crafted certificates loaded into the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:47.000000Z"}, {"uuid": "0c67ca89-3c15-4e9c-9bee-a7da846df973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41024", "type": "seen", "source": "https://t.me/cibsecurity/33581", "content": "\u203c CVE-2021-41024 \u203c\n\nA relative path traversal [CWE-23] vulnerabiltiy in FortiOS versions 7.0.0 and 7.0.1 and FortiProxy verison 7.0.0 may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T16:22:45.000000Z"}, {"uuid": "f2c7c6de-a218-4822-8e12-197dcdb2bcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41025", "type": "seen", "source": "https://t.me/cibsecurity/33640", "content": "\u203c CVE-2021-41025 \u203c\n\nMultiple vulnerabilities in the authentication mechanism of confd in FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 thorugh 6.0.7, including an instance of concurrent execution using shared resource with improper synchronization and one of authentication bypass by capture-replay, may allow a remote unauthenticated attacker to circumvent the authentication process and authenticate as a legitimate cluster peer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T22:23:02.000000Z"}, {"uuid": "4de443c3-b27d-43ba-adef-10fbda6e0d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41021", "type": "seen", "source": "https://t.me/cibsecurity/33613", "content": "\u203c CVE-2021-41021 \u203c\n\nA privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T20:22:46.000000Z"}, {"uuid": "a27b44b3-198c-4a89-8157-a6ea5053f1f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41023", "type": "seen", "source": "https://t.me/cibsecurity/31631", "content": "\u203c CVE-2021-41023 \u203c\n\nA unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:21.000000Z"}, {"uuid": "cb6d9c5e-a8d8-49a7-89b4-a1aa956c00bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41022", "type": "seen", "source": "https://t.me/cibsecurity/31632", "content": "\u203c CVE-2021-41022 \u203c\n\nA improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-02T21:23:23.000000Z"}, {"uuid": "ec6daf4d-4843-4f2c-a522-c24d0ee49e7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4102", "type": "exploited", "source": "https://t.me/MH_HACKING_termux/2269", "content": "\u062d\u062f\u062b\u0648\u0627 \u062a\u0637\u0628\u064a\u0642 \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u062d\u0627\u0644\u0627 ...\n \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 17\u0646\u0642\u0637\u0647 \u0636\u0639\u0641 \u0645\u0646 \u0646\u0648\u0639  CVE-2021-4102 \u0627\u0644\u062e\u0644\u0644 \u0641\u064a V8 JavaScript \u0648 WebAssembly\n\u0648\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0627\u0646 ....\n\u062c\u0648\u062c\u0644 \u062a\u0633\u0648\u064a \u0631\u0642\u0645 \u0642\u064a\u0627\u0633\u064a \u0641\u064a \u0625\u0644\u063a\u0627\u0621 17\u062b\u063a\u0631\u0647 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d \u062e\u0644\u0627\u0644 \u0627\u0644\u0639\u0627\u0645\ud83d\udd25", "creation_timestamp": "2021-12-14T09:00:24.000000Z"}]}