{"vulnerability": "CVE-2021-4436", "sightings": [{"uuid": "9bb1634c-961f-4c07-91ab-90ac35a2e9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4436", "type": "seen", "source": "https://t.me/ctinow/179108", "content": "https://ift.tt/VFnfqoB\nCVE-2021-4436", "creation_timestamp": "2024-02-05T10:31:57.000000Z"}, {"uuid": "22c0d836-f7cd-44fb-bcf1-a7b86e0847b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4436", "type": "seen", "source": "https://t.me/ctinow/196352", "content": "https://ift.tt/J7jGQIb\nCVE-2021-4436 | 3DPrint Lite Plugin up to 1.9.1.4 on WordPress p3dlite_handle_upload unrestricted upload", "creation_timestamp": "2024-02-29T08:47:11.000000Z"}, {"uuid": "b6e27e42-f0c8-401a-bc63-4ab764078905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4436", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/497907", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"Wordpress Plugin 3DPrint Lite Exploit! (CVE-2021-4436) (Asenkron)\", \n  \"author\": \" (Bunjo)\",\n  \"Detection Date\": \"16 Apr 2024\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2024-04-16T22:08:35.000000Z"}, {"uuid": "c3c82d58-2924-4764-87a2-93947ed5bff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4436", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/456754", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"Wordpress Plugin 3DPrint Lite Exploit! (CVE-2021-4436) (Asenkron)\", \n  \"author\": \" (Bunjo)\",\n  \"Detection Date\": \"29 Feb 2024\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2024-02-29T21:07:52.000000Z"}, {"uuid": "e0a99457-bbce-4b30-925d-b2fa2e25c277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44366", "type": "seen", "source": "https://t.me/cibsecurity/40829", "content": "\u203c CVE-2021-44366 \u203c\n\nMultiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T00:23:42.000000Z"}, {"uuid": "9c156dd7-3b74-4864-9761-efa42992398f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44368", "type": "seen", "source": "https://t.me/cibsecurity/36529", "content": "\u203c CVE-2021-44368 \u203c\n\nA denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetNetPort param is not object. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-29T00:22:13.000000Z"}, {"uuid": "1eb7e322-a77b-4f91-b78a-be369c44c0ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44369", "type": "seen", "source": "https://t.me/cibsecurity/36520", "content": "\u203c CVE-2021-44369 \u203c\n\nA denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetNtp param is not object. An attacker can send an HTTP request to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-29T00:21:58.000000Z"}]}