{"vulnerability": "CVE-2021-4417", "sightings": [{"uuid": "9ef49525-928f-41aa-b920-f10a345f1850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44174", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7887", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-44174\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-03-17T22:38:17.122Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-17T22:48:09.000000Z"}, {"uuid": "e4d48f16-9498-427b-b35c-550255723644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44173", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7886", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-44173\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-03-17T22:38:17.564Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-17T22:48:08.000000Z"}, {"uuid": "3c11242a-163b-48c5-8995-f0b9a17aaca0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44170", "type": "seen", "source": "https://t.me/cibsecurity/46475", "content": "\u203c CVE-2021-44170 \u203c\n\nA stack-based buffer overflow vulnerability [CWE-121] in the command line interpreter of FortiOS before 7.0.4 and FortiProxy before 2.0.8 may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-18T20:39:49.000000Z"}, {"uuid": "a2973a6e-bd66-4445-92b9-4367bff14544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44172", "type": "seen", "source": "https://t.me/cibsecurity/70383", "content": "\u203c CVE-2021-44172 \u203c\n\nAn exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClientEMS versions 7.0.0 through 7.0.4, 7.0.6 through 7.0.7, in all 6.4 and 6.2 version management interface may allow an unauthenticated attacker to gain information on environment variables such as the EMS installation path.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T16:23:51.000000Z"}, {"uuid": "5c71c1ae-35b7-4020-ace5-2c20ce1e0f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44171", "type": "seen", "source": "https://t.me/cibsecurity/51062", "content": "\u203c CVE-2021-44171 \u203c\n\nA improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiOS version 6.0.0 through 6.0.14, FortiOS version 6.2.0 through 6.2.10, FortiOS version 6.4.0 through 6.4.8, FortiOS version 7.0.0 through 7.0.3 allows attacker to execute privileged commands on a linked FortiSwitch via diagnostic CLI commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-10T18:24:55.000000Z"}, {"uuid": "722361af-6c71-4c5f-9dfe-a10be1e93f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44179", "type": "seen", "source": "https://t.me/cibsecurity/34326", "content": "\u203c CVE-2021-44179 \u203c\n\nAdobe Dimension versions 3.4.3 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-21T00:15:41.000000Z"}]}