{"vulnerability": "cve-2021-27860", "sightings": [{"uuid": "1c7489e8-329c-45ff-8abf-6841124b6c5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971196", "content": "", "creation_timestamp": "2024-12-24T20:25:42.859292Z"}, {"uuid": "6cf39d6e-db36-4795-8220-4adfec673785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:29.000000Z"}, {"uuid": "381c15be-2340-478b-90ea-11412239ef6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/6b71daf7-e406-46b8-859d-67b2b2a80a3e", "content": "", "creation_timestamp": "2025-12-09T23:30:57.000000Z"}, {"uuid": "ae821586-26ed-4aa6-bf5e-5333a0f35219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7a383d5e-415c-4060-aa15-d89da4da110e", "content": "", "creation_timestamp": "2026-02-02T12:28:30.394000Z"}, {"uuid": "19a39940-b9f3-4e47-bcb8-40d5e738c7c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/7544e906-dfda-47ae-ae7b-3ec0d5e26b56", "content": "", "creation_timestamp": "2023-05-25T16:46:30.000000Z"}, {"uuid": "0e4b069d-35ae-4415-9fd5-da0b9055207e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "https://t.me/arpsyndicate/984", "content": "#ExploitObserverAlert\n\nCVE-2021-27860\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-27860. A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.\n\nFIRST-EPSS: 0.049340000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T17:04:48.000000Z"}, {"uuid": "edba189b-5876-4a88-a574-24db4d05a322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/6b71daf7-e406-46b8-859d-67b2b2a80a3e", "content": "", "creation_timestamp": "2023-12-05T13:40:05.000000Z"}, {"uuid": "bcc92b37-3938-4b09-a135-f8b11644dfbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7a383d5e-415c-4060-aa15-d89da4da110e", "content": "", "creation_timestamp": "2026-02-02T12:28:30.394000Z"}, {"uuid": "6d4c7425-72b9-485e-b9c3-aa5207d54e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/7544e906-dfda-47ae-ae7b-3ec0d5e26b56", "content": "", "creation_timestamp": "2026-02-09T07:19:08.000000Z"}, {"uuid": "6ab7dbd0-a892-4865-9817-18f43f304329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "https://t.me/cibsecurity/33616", "content": "\u203c CVE-2021-27860 \u203c\n\nA vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 could allow a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-08T20:22:49.000000Z"}, {"uuid": "ce8d7e09-7004-497c-b3de-3cdf27c9a0fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27860", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}]}