{"vulnerability": "CVE-2021-4216", "sightings": [{"uuid": "5a263aa8-f829-4487-b0d2-7f618a6e4a9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4216", "type": "seen", "source": "https://t.me/cibsecurity/48896", "content": "\u203c CVE-2021-4216 \u203c\n\nA Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-26T20:30:30.000000Z"}, {"uuid": "6b596201-b7a9-4f6b-a851-e27d4e1de7a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42165", "type": "seen", "source": "https://t.me/cibsecurity/41805", "content": "\u203c CVE-2021-42165 \u203c\n\nMitraStar GPT-2541GNAC-N1 (HGU) 100VNZ0b33 devices allow remote authenticated users to obtain root access by executing command \"deviceinfo show file &amp;&amp;/bin/bash\" because of incorrect sanitization of parameter \"path\".\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-05T13:13:08.000000Z"}, {"uuid": "324e202d-782d-4045-a45d-3bea68bb97db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42168", "type": "seen", "source": "https://t.me/cibsecurity/36157", "content": "\u203c CVE-2021-42168 \u203c\n\nCross Site Scripting (XSS) in Sourcecodester Try My Recipe (Recipe Sharing Website - CMS) by oretnom23, allows attackers to gain the PHPSESID or other unspecified impacts via the fullname parameter to the login_registration page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-24T22:17:49.000000Z"}, {"uuid": "89a98121-d27c-451b-baf2-e9172f23cfce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42169", "type": "seen", "source": "https://t.me/cibsecurity/31047", "content": "\u203c CVE-2021-42169 \u203c\n\nThe Simple Payroll System with Dynamic Tax Bracket in PHP using SQLite Free Source Code (by: oretnom23 ) is vulnerable from remote SQL-Injection-Bypass-Authentication for the admin account. The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-22T18:39:28.000000Z"}]}