{"vulnerability": "cve-2021-3186", "sightings": [{"uuid": "74e548a0-a59d-41f0-8651-de2472a6256a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31862", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4625", "content": "#exploit\n1. CVE-2021-31862:\nSysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication\nhttps://github.com/RobertDra/CVE-2021-31862\n\n2. Research and PoC exploits for ONLYOFFICE\n(CVE-2021-25829, CVE-2021-25830, CVE-2021-25831, CVE-2021-25832, CVE-2021-25833)\nhttps://github.com/merrychap/POC-onlyoffice/tree/master", "creation_timestamp": "2021-10-30T14:32:34.000000Z"}, {"uuid": "b78b8554-18db-4418-8e57-bcb397ae5b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31862", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-31862.yaml", "content": "", "creation_timestamp": "2023-04-27T09:58:59.000000Z"}, {"uuid": "0bb2da91-a61e-4e1f-82b3-2ee4ac4aaa90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3186", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2584", "content": "#WLAN_Security\nTenda AC5 AC1200 Wireless - \"WiFi Name &amp; Password\" Stored Cross Site Scripting (PoC for CVE-2021-3186)\nhttps://www.exploit-db.com/exploits/49478", "creation_timestamp": "2021-02-08T05:22:54.000000Z"}, {"uuid": "e4aae88a-ecc0-4d5a-b52a-1ff5bf2c33b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31862", "type": "seen", "source": "https://t.me/cibsecurity/31446", "content": "\u203c CVE-2021-31862 \u203c\n\nSysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-29T14:18:09.000000Z"}, {"uuid": "07370621-efe4-4808-a58c-44dca4d2496a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31869", "type": "seen", "source": "https://t.me/cibsecurity/26871", "content": "\u203c CVE-2021-31869 \u203c\n\nPimcore AdminBundle version 6.8.0 and earlier suffers from a SQL injection issue in the specificID variable used by the application. This issue was fixed in version 6.9.4 of the product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-05T03:23:17.000000Z"}, {"uuid": "cae5b0f3-2fb2-4d7f-a33b-b52b5a64bce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-31867", "type": "seen", "source": "https://t.me/cibsecurity/26869", "content": "\u203c CVE-2021-31867 \u203c\n\nPimcore Customer Data Framework version 3.0.0 and earlier suffers from a Boolean-based blind SQL injection issue in the $id parameter of the SegmentAssignmentController.php component of the application. This issue was fixed in version 3.0.2 of the product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-05T03:23:15.000000Z"}]}