{"vulnerability": "CVE-2021-43396", "sightings": [{"uuid": "fc6ff95c-8b3e-4f92-9fdb-b7f8d405d5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43396", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupieul7sl2v", "content": "", "creation_timestamp": "2025-07-24T12:01:25.596742Z"}, {"uuid": "50924ac1-b066-4577-95fc-7fbeef6e740c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43396", "type": "seen", "source": "https://t.me/cibsecurity/31858", "content": "\u203c CVE-2021-43396 \u203c\n\nIn iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-04T23:25:40.000000Z"}]}