{"vulnerability": "CVE-2021-3831", "sightings": [{"uuid": "b3268f1c-0578-42de-9401-f36d5a4949f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/jakartablackhatcybercrime/56", "content": "ini exploit yang saya gunakan untuk Tipe CVE-2021-38314", "creation_timestamp": "2024-08-09T08:42:39.000000Z"}, {"uuid": "29bbcc86-2271-4e00-95fe-419d2bbaf79c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/jakartablackhatcybercrime/55", "content": "Saya menemukan celah keamanan bertipe medium\n\nNama Bug ini adalah [ CVE-2021-38314 ] \n\nhttps://dishub.jakarta.go.id/wp-admin/admin-ajax.php?action=aea2604b0f806c0fc360ff5e27d135b1\n\nSilahkan exploitasi jika menemukan data bagus boleh report langsung ke \n\ncsirt@jakarta.go.id", "creation_timestamp": "2024-08-09T07:02:01.000000Z"}, {"uuid": "7733066d-5907-4e26-8af7-0bc5d7b10b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "Telegram/sWRJXHmR4Ic_jr46Pf2A7P1wU5UOMn3eLWiRGa1cidzxKg", "content": "", "creation_timestamp": "2021-12-06T01:40:39.000000Z"}, {"uuid": "441efc68-ec2a-49d2-899b-3e33a76fb62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38311", "type": "seen", "source": "https://t.me/cibsecurity/27041", "content": "\u203c CVE-2021-38311 \u203c\n\nIn Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-10T02:50:55.000000Z"}, {"uuid": "5ffaed52-f85d-4f5a-9cf3-ca1ab8ffd9e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38318", "type": "seen", "source": "https://t.me/cibsecurity/28625", "content": "\u203c CVE-2021-38318 \u203c\n\nThe 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-09T22:30:09.000000Z"}, {"uuid": "9c8f2a09-6b8b-4608-abb8-d3dbafbce90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3271", "content": "https://medium.com/@vflexo/cve-2021-38314-leads-to-sensitive-information-disclosure-6e822784034f", "creation_timestamp": "2022-01-29T19:47:30.000000Z"}, {"uuid": "84c84c24-3794-48e8-b25c-b9ed9498e35b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3831", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3dnrkkbmw2n", "content": "", "creation_timestamp": "2025-10-16T21:02:31.255164Z"}, {"uuid": "43adad4a-b0d9-49ad-8c86-ac657820669f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1275", "content": "#exploit\nCVE-2021-38314:\nThe Gutenberg Template Library &amp; Redux Framework plugin &lt;=4.2.11 for WordPress\u00a0- Unauthenticated Sensitive Information Disclosure\nhttps://github.com/oxctdev/CVE-2021-38314\n\n@BlueRedTeam", "creation_timestamp": "2021-12-05T09:23:51.000000Z"}, {"uuid": "ed56364f-e62a-4d65-9c41-7b7d2e6ab2df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4905", "content": "#exploit\nCVE-2021-38314:\nThe Gutenberg Template Library &amp; Redux Framework plugin &lt;=4.2.11 for WordPress\u00a0- Unauthenticated Sensitive Information Disclosure\nhttps://github.com/oxctdev/CVE-2021-38314", "creation_timestamp": "2021-12-05T13:31:12.000000Z"}, {"uuid": "2f6b1d57-bfd1-478f-a48e-2e65a1e5f1f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/903", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a Unauthenticated Sensitive Information Disclosure (CVE-2021\u201338314).\nURL\uff1ahttps://github.com/oxctdev/CVE-2021-38314", "creation_timestamp": "2021-12-04T17:11:22.000000Z"}, {"uuid": "8b02a5d8-61b5-48fe-abb5-a0731552d5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38317", "type": "seen", "source": "https://t.me/cibsecurity/28626", "content": "\u203c CVE-2021-38317 \u203c\n\nThe Konnichiwa! Membership WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the plan_id parameter in the ~/views/subscriptions.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.8.3.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-09T22:30:13.000000Z"}, {"uuid": "4e17fcf1-9032-4e9a-b20c-4124bd0e0b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1271", "content": "CVE-2021\nUnauthenticated Sensitive Information Disclosure (CVE-2021\u201338314).\n\nhttps://github.com/oxctdev/CVE-2021-38314\n\n@BlueRedTeam", "creation_timestamp": "2021-12-04T19:04:08.000000Z"}, {"uuid": "69b04939-c45d-445a-929f-ea93706b60b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38314", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lxujarodld2c", "content": "", "creation_timestamp": "2025-09-02T16:15:55.785915Z"}]}