{"vulnerability": "CVE-2021-4279", "sightings": [{"uuid": "aee60590-6c3f-4b5f-a505-2e463ab2831c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42791", "type": "seen", "source": "https://t.me/cibsecurity/36456", "content": "\u203c CVE-2021-42791 \u203c\n\nAn issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T16:21:36.000000Z"}, {"uuid": "90d63d48-2dd9-4d96-aa43-1976033dc7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42794", "type": "seen", "source": "https://t.me/ctinow/157268", "content": "https://ift.tt/flsaEmP\nCVE-2021-42794 Exploit", "creation_timestamp": "2023-12-20T20:19:25.000000Z"}, {"uuid": "396eb534-333d-4c66-8b33-68cc83b7797d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4279", "type": "seen", "source": "https://t.me/cibsecurity/55321", "content": "\u203c CVE-2021-4279 \u203c\n\nA vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-26T00:50:07.000000Z"}]}