{"uuid": "7b1e3a3e-c2bc-43e1-8dc7-86fbda0ac1eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44486", "type": "seen", "source": "https://t.me/cibsecurity/40957", "content": "\u203c CVE-2021-44486 \u203c\n\nAn issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T22:34:07.000000Z"}