{"vulnerability": "CVE-2021-44227", "sightings": [{"uuid": "8ce13f3b-761a-4df1-bb09-8883d14431ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mg5nnhenjk27", "content": "", "creation_timestamp": "2026-03-03T11:21:21.621944Z"}, {"uuid": "48a76121-810b-49d7-ae08-96217d4998f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://t.me/arpsyndicate/1814", "content": "#ExploitObserverAlert\n\nCVE-2021-44227\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-44227. In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.\n\nFIRST-EPSS: 0.001120000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-16T11:43:04.000000Z"}, {"uuid": "5e4fbb91-88d2-449c-be58-4be2f62ac52a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://t.me/cibsecurity/33247", "content": "\u203c CVE-2021-44227 \u203c\n\nIn GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-02T07:36:00.000000Z"}]}