{"vulnerability": "cve-2021-3836", "sightings": [{"uuid": "7dbc809e-2097-49fd-bb2f-1d6fbb0b8f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38362", "type": "seen", "source": "https://t.me/cibsecurity/39887", "content": "\u203c CVE-2021-38362 \u203c\n\nIn RSA Archer 6.x through 6.9 SP3 (6.9.3.0), an authenticated attacker can make a GET request to a REST API endpoint that is vulnerable to an Insecure Direct Object Reference (IDOR) issue and retrieve sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-31T02:18:01.000000Z"}, {"uuid": "7fb2ebd3-267e-46d5-859e-c2c45844cc28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38365", "type": "seen", "source": "https://t.me/cibsecurity/27080", "content": "\u203c CVE-2021-38365 \u203c\n\nWinner (aka ToneWinner) desktop speakers through 2021-08-09 allow remote attackers to recover speech signals from the power-indicator LED via a telescope and an electro-optical sensor, aka a \"Glowworm\" attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-10T18:37:38.000000Z"}, {"uuid": "0da53f4d-4923-468a-bdc2-ec833474018d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38360", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9724", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-38360\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: The wp-publications WordPress plugin is vulnerable to restrictive local file inclusion via the Q_FILE parameter found in the ~/bibtexbrowser.php file which allows attackers to include local zip files and achieve remote code execution, in versions up to and including 0.0.\n\ud83d\udccf Published: 2021-09-10T13:35:04.746Z\n\ud83d\udccf Modified: 2025-03-31T18:22:52.396Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38360\n2. https://plugins.trac.wordpress.org/browser/wp-publications/trunk/bibtexbrowser.php?rev=1830330#L49", "creation_timestamp": "2025-03-31T18:31:59.000000Z"}, {"uuid": "6456958c-6db5-445d-870c-8d577d336d0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38363", "type": "seen", "source": "https://t.me/cibsecurity/62515", "content": "\u203c CVE-2021-38363 \u203c\n\nAn issue was discovered in ONOS 2.5.1. In IntentManager, the install-requested intent (which causes an exception) remains in pendingMap (in memory) forever. Deletion is possible neither by a user nor by the intermittent Intent Cleanup process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-20T16:30:45.000000Z"}, {"uuid": "93056bc1-d738-4dc8-ada9-386e10e339fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38364", "type": "seen", "source": "https://t.me/cibsecurity/62521", "content": "\u203c CVE-2021-38364 \u203c\n\nAn issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-20T16:30:51.000000Z"}, {"uuid": "78aebb3f-37d9-43b0-8c35-003f33f4b058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3836", "type": "seen", "source": "https://t.me/cibsecurity/33936", "content": "\u203c CVE-2021-3836 \u203c\n\ndbeaver is vulnerable to Improper Restriction of XML External Entity Reference\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T18:15:23.000000Z"}]}