{"uuid": "96b63257-2694-4e37-93a4-b50e066ae802", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4311", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-4311\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The patch is identified as 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability.\n\ud83d\udccf Published: 2023-01-09T11:20:22.017Z\n\ud83d\udccf Modified: 2025-04-09T19:25:57.677Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.217666\n2. https://vuldb.com/?ctiid.217666\n3. https://github.com/Talend/tmdm-server-se/pull/1420\n4. https://github.com/Talend/tmdm-server-se/commit/31d442b9fb1d518128fd18f6e4d54e06c3d67793", "creation_timestamp": "2025-04-09T19:48:29.000000Z"}