{"vulnerability": "CVE-2021-4149", "sightings": [{"uuid": "3326bc99-dc0f-42d9-bb39-98e2117a72bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41498", "type": "seen", "source": "https://t.me/cibsecurity/34236", "content": "\u203c CVE-2021-41498 \u203c\n\nBuffer overflow in ajaxsoundstudio.com Pyo &amp;lt and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-18T00:37:46.000000Z"}, {"uuid": "fc383f09-f183-44e3-b164-064c89a3daf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41490", "type": "seen", "source": "https://t.me/cibsecurity/44733", "content": "\u203c CVE-2021-41490 \u203c\n\nMemory leaks in LazyPRM.cpp of OMPL v1.5.0 can cause unexpected behavior.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-17T16:23:44.000000Z"}, {"uuid": "9266b14f-bc35-4310-9592-7fed690af26c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41499", "type": "seen", "source": "https://t.me/cibsecurity/34237", "content": "\u203c CVE-2021-41499 \u203c\n\nBuffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo &lt; 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-18T00:37:46.000000Z"}, {"uuid": "bb1a011e-ff67-4434-b964-d0b309dc6d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41495", "type": "seen", "source": "https://t.me/cibsecurity/34229", "content": "\u203c CVE-2021-41495 \u203c\n\nNull Pointer Dereference vulnerability exists in numpy.sort in NumPy &amp;lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating and sort arrays.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-17T22:37:41.000000Z"}, {"uuid": "4dddbd89-d86b-4485-aab5-cbc99d2258d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41496", "type": "seen", "source": "https://t.me/cibsecurity/34228", "content": "\u203c CVE-2021-41496 \u203c\n\nBuffer overflow in the array_from_pyobj function of fortranobject.c in NumPy &lt; 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-17T22:37:40.000000Z"}, {"uuid": "509ca45a-43fa-4c1c-8db3-ebc2379bce1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41497", "type": "seen", "source": "https://t.me/cibsecurity/34239", "content": "\u203c CVE-2021-41497 \u203c\n\nNull pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-18T00:37:48.000000Z"}, {"uuid": "e59f3b5b-22bd-4ad1-9ec4-f2a9147473aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41492", "type": "seen", "source": "https://t.me/cibsecurity/31785", "content": "\u203c CVE-2021-41492 \u203c\n\nMultiple SQL Injection vulnerabilities exist in Sourcecodester Simple Cashiering System (POS) 1.0 via the (1) Product Code in the pos page in cashiering. (2) id parameter in manage_products and the (3) t paramater in actions.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T23:23:39.000000Z"}]}