{"vulnerability": "CVE-2021-3717", "sightings": [{"uuid": "ff6ba110-1f4b-47d7-8d07-7e689746070f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3717", "type": "seen", "source": "https://t.me/cibsecurity/43295", "content": "\u203c CVE-2021-3717 \u203c\n\nA flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This flaw affects wildfly-core versions prior to 17.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-24T22:37:15.000000Z"}, {"uuid": "e855426a-c512-4b1f-bd9d-f73b34bf1f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37173", "type": "seen", "source": "https://t.me/cibsecurity/28776", "content": "\u203c CVE-2021-37173 \u203c\n\nA vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1501 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1510 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1511 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1512 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1524 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1536 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX5000 (All versions &lt; V2.14.1). The affected devices have an exposure of sensitive information vulnerability, if exploited, it could allow an authenticated attacker to extract data via Secure Shell (SSH).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-14T14:20:53.000000Z"}, {"uuid": "3b528958-33d4-424c-a237-d125c442f00d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37174", "type": "seen", "source": "https://t.me/cibsecurity/28775", "content": "\u203c CVE-2021-37174 \u203c\n\nA vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1501 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1510 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1511 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1512 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1524 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX1536 (All versions &lt; V2.14.1), RUGGEDCOM ROX RX5000 (All versions &lt; V2.14.1). The affected devices have a privilege escalation vulnerability, if exploited, an attacker could gain root user access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-14T14:20:52.000000Z"}, {"uuid": "e35419d5-e411-44d6-bafe-a9e506ea4550", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37179", "type": "seen", "source": "https://t.me/cibsecurity/27053", "content": "\u203c CVE-2021-37179 \u203c\n\nA vulnerability has been identified in Solid Edge SE2021 (All Versions &lt; SE2021MP7). The PSKERNEL.dll library in affected application lacks proper validation while parsing user-supplied OBJ files that could lead to a use-after-free condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13777)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-10T14:37:17.000000Z"}, {"uuid": "a8a36edc-6b12-42d9-8ec0-b16dc873de30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37172", "type": "seen", "source": "https://t.me/cibsecurity/27048", "content": "\u203c CVE-2021-37172 \u203c\n\nA vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V17 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-10T14:37:11.000000Z"}, {"uuid": "18ae56a2-88be-4996-b288-c2a76d14f368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37178", "type": "seen", "source": "https://t.me/cibsecurity/27043", "content": "\u203c CVE-2021-37178 \u203c\n\nA vulnerability has been identified in Solid Edge SE2021 (All Versions &lt; SE2021MP7). An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by loading a specially crafted xml file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-10T14:37:04.000000Z"}]}