{"vulnerability": "CVE-2021-4445", "sightings": [{"uuid": "20097e64-a324-444e-92e6-4e38142b70aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4445", "type": "seen", "source": "Telegram/ttj-MM_VSWER8csXt1ZTV-yIb5dsny16M_jFz63eaYMFVXgb", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}, {"uuid": "c96cd72d-2f97-4938-bd40-71807b6a644c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44458", "type": "seen", "source": "https://t.me/cibsecurity/35185", "content": "\u203c CVE-2021-44458 \u203c\n\nLinux users running Lens 5.2.6 and earlier could be compromised by visiting a malicious website. The malicious website could make websocket connections from the victim's browser to Lens and so operate the local terminal feature. This would allow the attacker to execute arbitrary commands as the Lens user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-10T18:14:54.000000Z"}, {"uuid": "3d56faf8-d204-49f4-afb1-91f9f5a918d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44453", "type": "seen", "source": "https://t.me/cibsecurity/34594", "content": "\u203c CVE-2021-44453 \u203c\n\nmySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T22:19:52.000000Z"}]}