{"vulnerability": "cve-2021-3179", "sightings": [{"uuid": "b9fa102a-6b1c-46b8-829d-18d9f592e03a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3179", "type": "seen", "source": "https://t.me/cibsecurity/34163", "content": "\u203c CVE-2021-3179 \u203c\n\nGGLocker iOS application, contains an insecure data storage of the password hash value which results in an authentication bypass.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-16T22:36:06.000000Z"}, {"uuid": "d7134ae3-bda9-41a3-bf97-900283bc6383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31796", "type": "seen", "source": "https://t.me/cibsecurity/28204", "content": "\u203c CVE-2021-31796 \u203c\n\nAn inadequate encryption vulnerability discovered in CyberArk Credential Provider before 12.1 may lead to Information Disclosure. An attacker may realistically have enough information that the number of possible keys (for a credential file) is only one, and the number is usually not higher than 2^36.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T07:35:45.000000Z"}, {"uuid": "69b9f73a-97a9-447c-8f53-ccc46220245b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31798", "type": "seen", "source": "https://t.me/cibsecurity/28203", "content": "\u203c CVE-2021-31798 \u203c\n\nThe effective key space used to encrypt the cache in CyberArk Credential Provider prior to 12.1 has low entropy, and under certain conditions a local malicious user can obtain the plaintext of cache files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T07:35:43.000000Z"}, {"uuid": "e71c730e-881a-43bf-bf31-0564128cdbfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31793", "type": "seen", "source": "Telegram/4apOIVRFBP7HaKLObPeBsP9auMBdLps6d1jtKdxPinxvj3k", "content": "", "creation_timestamp": "2021-05-07T17:46:52.000000Z"}, {"uuid": "92b38190-5084-4bdd-8747-9629bd9aa896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31796", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/675", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aC-Ark Credential Decoder for #CVE-2021-31796\nURL\uff1ahttps://github.com/unmanarc/CACredDecoder", "creation_timestamp": "2021-10-11T18:03:06.000000Z"}, {"uuid": "62e5b91d-a722-469c-8a78-1728b9626018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31797", "type": "seen", "source": "https://t.me/cibsecurity/28201", "content": "\u203c CVE-2021-31797 \u203c\n\nThe user identification mechanism used by CyberArk Credential Provider prior to 12.1 is susceptible to a local host race condition, leading to password disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T07:35:39.000000Z"}]}