{"vulnerability": "CVE-2021-4329", "sightings": [{"uuid": "980574bc-4072-4132-9906-885f1263a4f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43297", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8569", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2021-43297: APACHE Dubbo Remote Code Execution Vulnerability Alert\n\nhttps://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww\n\nhttps://securityonline.info/cve-2021-43297-apache-dubbo-remote-code-execution-vulnerability/", "creation_timestamp": "2022-01-14T07:16:47.000000Z"}, {"uuid": "da8ad0f1-08a2-4070-a02a-7a262629c3e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43297", "type": "seen", "source": "https://t.me/arpsyndicate/3185", "content": "#ExploitObserverAlert\n\nCVE-2021-43297\n\nDESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.\n\nFIRST-EPSS: 0.011420000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T03:32:50.000000Z"}, {"uuid": "02ee9342-2a11-4aaf-88ab-6dbb50c449c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43297", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1352", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApache Dubbo Hessian2 CVE-2021-43297 demo\nURL\uff1ahttps://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297", "creation_timestamp": "2022-01-17T17:57:12.000000Z"}, {"uuid": "5d022781-aa01-48fc-aeb7-04512e17b4a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43297", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1350", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-43297 POC\nURL\uff1ahttps://github.com/bitterzzZZ/CVE-2021-43297-POC", "creation_timestamp": "2022-01-17T12:28:54.000000Z"}, {"uuid": "da9fbc34-e993-4dc3-a8e9-c6e5f4373170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43290", "type": "seen", "source": "https://t.me/cibsecurity/40766", "content": "\u203c CVE-2021-43290 \u203c\n\nAn issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker who has compromised a GoCD agent can upload a malicious file into a directory of a GoCD server. They can control the filename but the directory is placed inside of a directory that they can't control.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-14T16:19:11.000000Z"}, {"uuid": "b5be0f23-1dc1-4be1-8ddf-c33c6725414a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43294", "type": "seen", "source": "https://t.me/cibsecurity/33131", "content": "\u203c CVE-2021-43294 \u203c\n\nZoho ManageEngine SupportCenter Plus before 11016 is vulnerable to Reflected XSS in the Products module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T22:34:39.000000Z"}, {"uuid": "ff056491-0cfd-4605-ad29-0891e3f1337e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43296", "type": "seen", "source": "https://t.me/cibsecurity/33129", "content": "\u203c CVE-2021-43296 \u203c\n\nZoho ManageEngine SupportCenter Plus before 11016 is vulnerable to an SSRF attack in ActionExecutor.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T22:34:37.000000Z"}, {"uuid": "ed5e1378-a209-40d4-904e-34340d4bce93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43293", "type": "seen", "source": "https://t.me/cibsecurity/31848", "content": "\u203c CVE-2021-43293 \u203c\n\nSonatype Nexus Repository Manager 3.x before 3.36.0 allows a remote authenticated attacker to potentially perform network enumeration via Server Side Request Forgery (SSRF).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T21:25:00.000000Z"}, {"uuid": "bdebc757-cd1a-4a71-8966-73a49e08d1f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43297", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/632", "content": "windows HTTP RCE CVE-2022-21907\nhttps://github.com/antx-code/CVE-2022-21907\n\nAn exploit / PoC for CVE-2021-42237\nhttps://github.com/PinkDev1/CVE-2021-42237\n\nApache Dubbo Hessian2 CVE-2021-43297 demo\nhttps://github.com/longofo/Apache-Dubbo-Hessian2-CVE-2021-43297", "creation_timestamp": "2022-01-19T15:20:36.000000Z"}, {"uuid": "aad3d758-acc7-4ade-a9cb-0e888dce950c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4329", "type": "seen", "source": "https://t.me/cibsecurity/59433", "content": "\u203c CVE-2021-4329 \u203c\n\nA vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-05T22:37:04.000000Z"}, {"uuid": "56668aa1-002b-44d2-bdcc-6a601e3d5bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43299", "type": "seen", "source": "https://t.me/cibsecurity/37637", "content": "\u203c CVE-2021-43299 \u203c\n\nStack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' argument may cause a buffer overflow since it is copied to a fixed-size stack buffer without any size validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-17T00:39:38.000000Z"}, {"uuid": "5c41e5de-c0a8-42e7-86a7-c3410d8f7901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43295", "type": "seen", "source": "https://t.me/cibsecurity/33144", "content": "\u203c CVE-2021-43295 \u203c\n\nZoho ManageEngine SupportCenter Plus before 11016 is vulnerable to Reflected XSS in the Accounts module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T22:34:54.000000Z"}]}