{"vulnerability": "CVE-2021-4128", "sightings": [{"uuid": "00a71211-cee0-4812-9461-045e0413345d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41282", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "6989fe45-eccb-41d8-b159-85d0d293089a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41282", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:40.000000Z"}, {"uuid": "5ac1ad43-1589-4873-97ee-23270a0f05b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41280", "type": "seen", "source": "https://t.me/cibsecurity/32730", "content": "\u203c CVE-2021-41280 \u203c\n\nSharetribe Go is a source available marketplace software. In affected versions operating system command injection is possible on installations of Sharetribe Go, that do not have a secret AWS Simple Notification Service (SNS) notification token configured via the `sns_notification_token` configuration parameter. This configuration parameter is unset by default. The vulnerability has been patched in version 10.2.1. Users who are unable to upgrade should set the`sns_notification_token` configuration parameter to a secret value.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-19T22:17:01.000000Z"}, {"uuid": "73c945e0-f17f-41f4-9612-be9555753d61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41282", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/pfsense_diag_routes_webshell.rb", "content": "", "creation_timestamp": "2022-03-03T21:29:29.000000Z"}, {"uuid": "a77b4fb0-e237-415c-af9c-23cac43e2d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41285", "type": "published-proof-of-concept", "source": "https://t.me/cKure/7429", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Crucial\u2019s MOD Utility LPE \u2013 CVE-2021-41285\n\nhttps://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/", "creation_timestamp": "2021-10-04T09:18:30.000000Z"}, {"uuid": "d72087a6-5338-4d78-a007-9407e51ea137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41286", "type": "seen", "source": "https://t.me/cibsecurity/29994", "content": "\u203c CVE-2021-41286 \u203c\n\nOmikron MultiCash Desktop 4.00.008.SP5 relies on a client-side authentication mechanism. When a user logs into the application, the validity of the password is checked locally. All communication to the database backend is made via the same technical account. Consequently, an attacker can attach a debugger to the process or create a patch that manipulates the behavior of the login function. When the function always returns the success value (corresponding to a correct password), an attacker can login with any desired account, such as the administrative account of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-05T20:30:36.000000Z"}, {"uuid": "54961104-123e-4bee-b153-227200001722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41288", "type": "seen", "source": "https://t.me/cibsecurity/29757", "content": "\u203c CVE-2021-41288 \u203c\n\nZoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-30T22:13:48.000000Z"}]}