{"vulnerability": "cve-2021-2400", "sightings": [{"uuid": "d920f8de-d1d4-4ccd-8935-360badb33961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24006", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ln6ztje3zf27", "content": "", "creation_timestamp": "2025-04-19T21:02:15.339272Z"}, {"uuid": "9f8d2577-efbc-48b4-ae14-1831372eb9f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24000", "type": "seen", "source": "https://t.me/cibsecurity/25680", "content": "\u203c CVE-2021-24000 \u203c\n\nA race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as &lt;input type=\"file\"&gt;) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox &lt; 88.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-24T18:18:31.000000Z"}, {"uuid": "449270f0-0d71-4a45-8fd3-46dbdffab5a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24008", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9297", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-24008\n\ud83d\udd25 CVSS Score: 5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:X)\n\ud83d\udd39 Description: An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file.\n\ud83d\udccf Published: 2025-03-28T10:13:32.120Z\n\ud83d\udccf Modified: 2025-03-28T10:13:32.120Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-20-105", "creation_timestamp": "2025-03-28T10:28:08.000000Z"}, {"uuid": "6f59f640-8eb9-4c05-a81a-83dddf36b2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24008", "type": "seen", "source": "https://t.me/cvedetector/21395", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2021-24008 - FortiDDoS FortiVoice FortiRecorder FortiMail Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2021-24008 \nPublished : March 28, 2025, 11:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T13:33:49.000000Z"}, {"uuid": "d051a2f0-7804-468f-bfd4-79134dd36480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-24007", "type": "seen", "source": "https://t.me/cibsecurity/26043", "content": "\u203c CVE-2021-24007 \u203c\n\nMultiple improper neutralization of special elements of SQL commands vulnerabilities in FortiMail before 6.4.4 may allow a non-authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-09T22:15:06.000000Z"}, {"uuid": "7e17e7a2-4936-4caa-8c23-92f14b909f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-2400", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4293", "content": "#exploit\n1. CVE-2021-24499:\nMass exploitation of CVE-2021-24499 unauthenticated upload leading to RCE in Workreap WordPress theme &lt;2.2.2\nhttps://github.com/RyouYoo/CVE-2021-24499\n\n2. CVE-2021-2400/2401:\nOracle Business Intelligence XXE\nhttps://testbnull.medium.com/linh-tinh-v%E1%BB%81-oracle-business-intelligence-part-1-5a050b48a193", "creation_timestamp": "2024-05-14T02:41:03.000000Z"}]}