{"vulnerability": "CVE-2021-4173", "sightings": [{"uuid": "facc7e82-d8ef-4afe-85a2-eb91b9d2db4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41737", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113460992286679711", "content": "", "creation_timestamp": "2024-11-10T22:22:28.610909Z"}, {"uuid": "95c9dfe4-f72e-4939-9704-793ab297bb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41731", "type": "seen", "source": "https://t.me/cibsecurity/49937", "content": "\u203c CVE-2021-41731 \u203c\n\nCross Site Scripting (XSS vulnerability exists in )Sourcecodester News247 News Magazine (CMS) PHP 5.6 or higher and MySQL 5.7 or higher via the blog category name field\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T20:29:07.000000Z"}, {"uuid": "d584b819-19e1-47a6-9cc1-480f236f84c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41737", "type": "seen", "source": "https://t.me/cvedetector/10442", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-41737 - Faust OOB Stack Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2021-41737 \nPublished : Nov. 10, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : In Faust 2.23.1, an input file with the lines \"// r visualisation tCst\" and \"//process = +: L: abM-^Q;\" and \"process = route(3333333333333333333,2,1,2,3,1) : *;\" leads to stack consumption. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T01:02:41.000000Z"}, {"uuid": "589d9389-212c-45ee-9afc-ef889b0336f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41739", "type": "seen", "source": "https://t.me/cibsecurity/41969", "content": "\u203c CVE-2021-41739 \u203c\n\nA OS Command Injection vulnerability was discovered in Artica Proxy 4.30.000000. Attackers can execute OS commands in cyrus.events.php with GET param logs and POST param rp.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T14:36:15.000000Z"}, {"uuid": "ba9d3eec-a79d-4213-88da-bb87e2a0898b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41733", "type": "seen", "source": "https://t.me/cibsecurity/31979", "content": "\u203c CVE-2021-41733 \u203c\n\nOppia 3.1.4 does not verify that certain URLs are valid before navigating to them.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-08T18:28:59.000000Z"}, {"uuid": "ab2608fd-a1ff-4dce-a93c-a3974496913b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4173", "type": "seen", "source": "https://t.me/cibsecurity/34669", "content": "\u203c CVE-2021-4173 \u203c\n\nvim is vulnerable to Use After Free\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-27T16:23:10.000000Z"}, {"uuid": "209ed315-a074-4eca-b885-7a27230c08de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41732", "type": "seen", "source": "https://t.me/cibsecurity/29675", "content": "\u203c CVE-2021-41732 \u203c\n\nAn issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T22:37:04.000000Z"}, {"uuid": "ec95168a-e754-4044-8c2c-2d82deeee280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41730", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1554", "content": "#exploit\nCVE-2021-41730:\nTENDA Authorization RCE\nhttps://github.com/IBUILI/CVE-2021-41730\n\n@BlueRedTeam", "creation_timestamp": "2021-12-21T09:36:46.000000Z"}, {"uuid": "71f23e0d-5dff-4bd4-8c9a-03b99e1df335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41730", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5023", "content": "#exploit\nCVE-2021-41730:\nTENDA Authorization RCE\nhttps://sploitus.com/exploit?id=38F16637-B6A1-581E-A1E8-DEAA444DD38A", "creation_timestamp": "2024-09-23T16:22:54.000000Z"}]}