{"vulnerability": "cve-2021-27890", "sightings": [{"uuid": "4b49fe6d-0d69-444a-8091-e20cfd0da477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27890", "type": "exploited", "source": "https://t.me/infobes/301", "content": "CVE-2021-26855/27065 - ProxyLogon MS Exchange Server RCE Vulnerability\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2021-3156 - Heap-Based Buffer Overflow in Sudo\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2021-22986 - F5 BIG-IP TMM uri_normalize_host infoleak and out-of-bounds write\nhttps://t.me/cybersecuritytechnologies/2881\nCVE-2021-27076 - A Replay-style Deserialization Attack Against SharePoint\nhttps://t.me/cybersecuritytechnologies/2930\nCVE-2021-21193 - Google Chrome Blink code execution\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21193\nCVE-2021-22987 - F5 BIG-IP TMM uri_normalize_host infoleak and out-of-bounds write\nhttps://t.me/cybersecuritytechnologies/2881\nCVE-2021-21193:\nGoogle Chrome Blink code execution\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21193\nCVE-2021-27076:\nReplay Deserialization Attack Against SharePoint\nhttps://t.me/cybersecuritytechnologies/2930\nCVE-2021-27889, CVE-2021-27890:\nMyBB RCE Chain\nhttps://blog.sonarsource.com/mybb-remote-code-execution-chain", "creation_timestamp": "2021-03-22T10:14:45.000000Z"}, {"uuid": "cf4a4748-1ee4-4de2-a621-7e8a88b6f38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27890", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2955", "content": "#Analytics\n10 most exploited vulnerabilities of the week (march 15 - 21)\nCVE-2021-26855/27065 - ProxyLogon MS Exchange Server RCE\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2021-3156 - Heap-Based Buffer Overflow in Sudo\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2021-22986/22987 - F5 BIG-IP TMM uri_normalize_host infoleak and out-of-bounds write\nhttps://t.me/cybersecuritytechnologies/2881\nCVE-2021-27076 - A Replay-style Deserialization Attack Against SharePoint\nhttps://t.me/cybersecuritytechnologies/2930\nCVE-2021-21193 - Google Chrome Blink code execution\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21193\nCVE-2021-21193:\nGoogle Chrome Blink code execution\nhttps://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21193\nCVE-2021-27076:\nReplay Deserialization Attack Against SharePoint\nhttps://t.me/cybersecuritytechnologies/2930\nCVE-2021-27889, CVE-2021-27890:\nMyBB RCE Chain\nhttps://blog.sonarsource.com/mybb-remote-code-execution-chain", "creation_timestamp": "2021-03-29T05:54:18.000000Z"}, {"uuid": "9f79b0bb-9b59-473c-950a-a79ae843eaa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27890", "type": "seen", "source": "MISP/68f963f7-0da0-4070-b2f2-1748ec23f2e8", "content": "", "creation_timestamp": "2024-11-14T06:08:18.000000Z"}, {"uuid": "4e82f31d-7252-425d-bd05-4927710eb6f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27890", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/31", "content": "CVE-2021-27890 MyBB\u5f8c\u53f0\u8ad6\u58c7\u4e3b\u984c\u7ba1\u7406SQL\u6ce8\u5165\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-27890_MyBB%E5%BE%8C%E5%8F%B0%E8%AB%96%E5%A3%87%E4%B8%BB%E9%A1%8C%E7%AE%A1%E7%90%86SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T06:42:55.000000Z"}, {"uuid": "6a866ed3-5411-4a63-9d29-7de21be84581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-27890", "type": "seen", "source": "https://t.me/ptswarm/62", "content": "MyBB fixed a Persistent XSS (CVE-2021-27279) in MyBB &lt; 1.8.25 found by our researcher Igor Sak-Sakovskiy.\n\nRCE is possible when chained with CVE-2021-27890, reported by Simon Scannell &amp; Carl Smith.\n\nAdvisory: https://mybb.com/versions/1.8.25/", "creation_timestamp": "2021-08-12T15:53:02.000000Z"}]}