{"vulnerability": "CVE-2021-4434", "sightings": [{"uuid": "f3fa6834-99ff-426e-b90f-d76e7210ac74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4434", "type": "seen", "source": "https://t.me/ctinow/182617", "content": "https://ift.tt/eXWrK9M\nCVE-2021-4434 | warfareplugins Social Sharing Plugin up to 3.5.2 on WordPress swp_url code injection (ID 163680)", "creation_timestamp": "2024-02-10T17:46:34.000000Z"}, {"uuid": "ebe4aeb3-e540-4e15-bb46-2b4523adc8e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44340", "type": "seen", "source": "https://t.me/cibsecurity/38183", "content": "\u203c CVE-2021-44340 \u203c\n\nDavid Brackeen ok-file-formats dev version is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_jpg_generate_huffman_table() in \"/ok_jpg.c:403\".\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-28T18:23:30.000000Z"}, {"uuid": "f34331ad-54f0-48f9-b5da-dbfd7d3d6189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4434", "type": "seen", "source": "https://t.me/ctinow/173005", "content": "https://ift.tt/Nec62gm\nCVE-2021-4434 Exploit", "creation_timestamp": "2024-01-24T19:16:34.000000Z"}, {"uuid": "f194720b-d9a2-4d06-b88e-3109d900a787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44342", "type": "seen", "source": "https://t.me/cibsecurity/38192", "content": "\u203c CVE-2021-44342 \u203c\n\nDavid Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in \"/ok_png.c:494\".\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-28T20:23:25.000000Z"}, {"uuid": "3906edf2-c41a-4652-805e-3239252e5f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44348", "type": "seen", "source": "https://t.me/cibsecurity/33339", "content": "\u203c CVE-2021-44348 \u203c\n\nSQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameer in App\\Manage\\Controller\\AdvertController.class.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-03T22:38:14.000000Z"}, {"uuid": "146a810d-4242-419c-b8f0-c24dbe50b9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44349", "type": "seen", "source": "https://t.me/cibsecurity/33337", "content": "\u203c CVE-2021-44349 \u203c\n\nSQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameter in App\\Manage\\Controller\\DownloadController.class.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-03T22:38:09.000000Z"}, {"uuid": "ada92272-16ff-489a-99a3-694f19d625ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44347", "type": "seen", "source": "https://t.me/cibsecurity/33336", "content": "\u203c CVE-2021-44347 \u203c\n\nSQL Injection vulnerability exists in TuziCMS v2.0.6 in App\\Manage\\Controller\\GuestbookController.class.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-03T22:38:08.000000Z"}]}