{"vulnerability": "cve-2021-43811", "sightings": [{"uuid": "890d88a2-19a0-4942-82ea-15bb26a85ec2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43811", "type": "published-proof-of-concept", "source": "Telegram/P942jOdyqR7oFT29HyIsqSCa5ypLmatmlqAq5qduNAKCsA", "content": "", "creation_timestamp": "2022-08-22T13:51:08.000000Z"}, {"uuid": "db9a1bd3-fc1a-47b1-a53c-e624bec11f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43811", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6646", "content": "#exploit\n1. CVE-2021-43811:\nawslabs/sockeye Code injection via unsafe YAML loading\nhttps://github.com/s-index/CVE-2021-43811\n\n2. Exploiting WebKit JSPropertyNameEnumerator Out-of-Bounds Read (CVE-2021-1789)\nhttps://starlabs.sg/blog/2022/08-exploiting-webkit-jspropertynameenumerator-out-of-bounds-read-cve-2021-1789", "creation_timestamp": "2022-08-22T15:44:19.000000Z"}, {"uuid": "e83e8491-5620-4a63-97a3-539c269c9233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43811", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1059", "content": "Updates On Hackbyte Forum:-\n\n1. Defcon 27 Files\n2. pfizer files Leaks 2022\n3. CVE-2021-43811 exploit\n4. Sandman - a backdoor that meant to work on hardened networks during red team engagements\n5. GTPv1/GTPv2 Dialer\n6. capa - detects capabilities in executable files\n7. CVE-2022-1802 Exploit\n8. Pitraix - Modern Cross-Platform HTTP-Based P2P Botnet over TOR that cannot be traced\n9. crAPI - completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks\n10. aerodar.ru Leak\n11. manyavar.com Leak\n12. ExportDumper - A small tool I made to dump the export table of PE files\n13. Redline FreeLogs\n14. City Hall of La Haba Spain Leak\n15. OAO Rybinskgazservis Gas distribution Rusia Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-22T14:03:16.000000Z"}, {"uuid": "f65ff7d4-fd5b-47ba-9f1d-55ba0be66148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43811", "type": "seen", "source": "https://t.me/cibsecurity/33667", "content": "\u203c CVE-2021-43811 \u203c\n\nSockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-09T02:23:05.000000Z"}]}