{"vulnerability": "cve-2021-3777", "sightings": [{"uuid": "daca43ef-3f35-4008-948c-f62d4f8a307e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37774", "type": "seen", "source": "https://t.me/cibsecurity/56714", "content": "\u203c CVE-2021-37774 \u203c\n\nAn issue was discovered in function httpProcDataSrv in TL-WDR7660 2.0.30 that allows attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-19T16:21:56.000000Z"}, {"uuid": "cc81ed77-6472-4698-a3cb-ee815b98f3f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37770", "type": "seen", "source": "https://t.me/cibsecurity/45413", "content": "\u203c CVE-2021-37770 \u203c\n\nNucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T18:38:38.000000Z"}, {"uuid": "539d3ebb-bcac-405e-bf3a-ed24486af412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37778", "type": "seen", "source": "https://t.me/cibsecurity/45412", "content": "\u203c CVE-2021-37778 \u203c\n\nThere is a buffer overflow in gps-sdr-sim v1.0 when parsing long command line parameters, which can lead to DoS or code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T18:38:37.000000Z"}, {"uuid": "72a01023-9a7e-4199-b9a4-1504d497cf7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37777", "type": "seen", "source": "https://t.me/cibsecurity/29871", "content": "\u203c CVE-2021-37777 \u203c\n\nGila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). Thumbnails uploaded by one site owner are visible by another site owner just by knowing the other site name and fuzzing for picture names. This leads to sensitive information disclosure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-04T18:18:43.000000Z"}]}