{"vulnerability": "CVE-2021-4219", "sightings": [{"uuid": "e6409a97-3b2f-4de4-abb8-b25945241ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42192", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-42192.yaml", "content": "", "creation_timestamp": "2023-04-27T09:58:59.000000Z"}, {"uuid": "9f21d5d0-ec03-484d-8709-5e446d8c2f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42192", "type": "seen", "source": "https://t.me/cibsecurity/41891", "content": "\u203c CVE-2021-42192 \u203c\n\nKonga v0.14.9 is affected by an incorrect access control vulnerability where a specially crafted request can lead to privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-04T14:34:49.000000Z"}, {"uuid": "ef14870b-4db8-4416-8bee-122e6c68ff37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42199", "type": "seen", "source": "https://t.me/cibsecurity/43708", "content": "\u203c CVE-2021-42199 \u203c\n\nAn issue was discovered in swftools through 20201222. A heap buffer overflow exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-02T18:38:44.000000Z"}, {"uuid": "69a186cd-a4cf-4ad9-8bd7-8dcd99e05e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42194", "type": "seen", "source": "https://t.me/cibsecurity/39296", "content": "\u203c CVE-2021-42194 \u203c\n\nThe wechat_return function in /controller/Index.php of EyouCms V1.5.4-UTF8-SP3 passes the user's input directly into the simplexml_ load_ String function, which itself does not prohibit external entities, triggering a XML external entity (XXE) injection vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-21T01:25:25.000000Z"}]}