{"vulnerability": "cve-2021-4176", "sightings": [{"uuid": "9477c3e8-8237-4d90-9839-b56a59cf3077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41766", "type": "seen", "source": "https://t.me/cibsecurity/36294", "content": "\u203c CVE-2021-41766 \u203c\n\nApache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-26T14:19:31.000000Z"}, {"uuid": "5d18ec71-de13-4574-99b6-54687cffdcb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41769", "type": "seen", "source": "https://t.me/cibsecurity/35227", "content": "\u203c CVE-2021-41769 \u203c\n\nA vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions &lt; V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions &lt; V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions &lt; V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-11T14:15:50.000000Z"}, {"uuid": "fb2de48e-364c-4df5-8c47-eb45db4969d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41764", "type": "seen", "source": "https://t.me/cibsecurity/29682", "content": "\u203c CVE-2021-41764 \u203c\n\nA cross-site request forgery (CSRF) vulnerability exists in Streama up to and including v1.10.3. The application does not have CSRF checks in place when performing actions such as uploading local files. As a result, attackers could make a logged-in administrator upload arbitrary local files via a CSRF attack and send them to the attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-30T00:37:09.000000Z"}, {"uuid": "1f10d5f5-a700-497d-ba86-4feafc007c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41765", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1165", "content": "#exploit\nCVE-2021-41765:\nUnauthenticated SQLi to RCE Chain\nhttps://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace\n\n@BlueRedTeam", "creation_timestamp": "2021-11-12T05:30:02.000000Z"}, {"uuid": "7bda0339-d402-463a-b3e9-78cb9ed6bf3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-41765", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4735", "content": "#exploit\nCVE-2021-41765:\nUnauthenticated SQLi to RCE Chain\nhttps://www.horizon3.ai/multiple-vulnerabilities-in-resourcespace", "creation_timestamp": "2021-11-12T12:22:19.000000Z"}, {"uuid": "a338488f-af61-423d-8e92-e2380c2b9a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4176", "type": "seen", "source": "https://t.me/cibsecurity/34740", "content": "\u203c CVE-2021-4176 \u203c\n\nlivehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-29T18:32:28.000000Z"}]}