{"vulnerability": "CVE-2021-44736", "sightings": [{"uuid": "7ba7428c-2ebf-4f75-ba17-109ac652fa7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3128", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bRICC \n\nRobust Collective Classification of Sybil Accounts\n\nhttps://github.com/WSP-LAB/RICC\n\n#cybersecurity #infosec\n\n\u200b\u200bopen-appsec \n\nA machine learning security engine that preemptively and automatically prevents threats against Web Application &amp; APIs. This repo include the main code and logic.\n\nhttps://github.com/openappsec/openappsec\n\n#cybersecurity #infosec\n\n\u200b\u200bcypherhound\n\nPython3 terminal application that contains 270+ Neo4j cyphers for BloodHound data sets and 254 GUI cyphers.\n\nhttps://github.com/fin3ss3g0d/cypherhound\n\n#infosec #pentesting #redteam\n\n\u200b\u200bProxy-checker\n\nProxyChecker Made in NodeJS\n\nhttps://github.com/rawbypa/proxychecker\n\n#infosec #privacy\n\n\u200b\u200bCVE-2021-44736\n\nEmbedded web server command injection vulnerability in Lexmark devices.\n\nhttps://github.com/defensor/CVE-2021-44735\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200boutlook_email_auth_bypass\n\nIn Outlook desktop and web app , \"display name\" of email's \"From\" header can manipulate the from email which is displayed to the user, that can result in more convincing phish emails.\n\nhttps://gitlab.com/email_bug/outlook_email_auth_bypass\n\n#infosec #pentesting #redteam\n\n\u200b\u200bnetspionage\n\nNetwork Analysis CLI framework that performs Network Scanning, #OSINT, and Attack Detection.\n\nhttps://github.com/ANG13T/netspionage\n\n#infosec #pentesting #cybersecurity\n\n\u200b\u200bCVE-2023-20126\n\nCisco SPA112 2-Port Phone Adapters RCE.\n\nhttps://github.com/fullspectrumdev/RancidCrisco\n\n#cve #infosec #pentesting\n\n\u200b\u200bDCOM DLL Hijacking\n\nWe recently discovered the following DCOM classes that are subject to DLL hijacking. If an attacker can write to the associated path, they can move laterally by instantiating the COM object. Some classes have additional DLL hijacking opportunities that are not listed here.\n\nhttps://github.com/WKL-Sec/dcomhijack\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-27T07:27:15.000000Z"}, {"uuid": "6485b0f5-562a-4998-99d6-e81c894b70d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "seen", "source": "https://t.me/cibsecurity/35939", "content": "\u203c CVE-2021-44736 \u203c\n\nThe initial admin account setup wizard on Lexmark devices allow unauthenticated access to the \u00e2\u20ac\u0153out of service erase\u00e2\u20ac\ufffd feature.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-20T20:11:59.000000Z"}, {"uuid": "499d7eec-db36-471f-85c8-52d5f48fb859", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/772", "content": "https://github.com/defensor/CVE-2021-44736\n#github", "creation_timestamp": "2023-07-27T12:01:02.000000Z"}, {"uuid": "f065a57c-29ab-4747-8899-cd1d5229c3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8723", "content": "#exploit\n1. CVE-2021-44736:\nEmbedded web server command injection vulnerability in Lexmark devices\nhttps://github.com/defensor/CVE-2021-44735\n\n2. CVE-2021-44736:\nLexmark devices - unauthenticated access\nhttps://github.com/defensor/CVE-2021-44736", "creation_timestamp": "2023-07-24T10:59:01.000000Z"}]}