{"vulnerability": "cve-2021-4444", "sightings": [{"uuid": "06ca8509-4a5d-4c1c-829d-2fd54fa03d3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44446", "type": "seen", "source": "https://t.me/cibsecurity/33906", "content": "\u203c CVE-2021-44446 \u203c\n\nA vulnerability has been identified in JT Utilities (All versions &lt; V13.0.3.0), JTTK (All versions &lt; V11.0.3.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14828, ZDI-CAN-14898)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:11.000000Z"}, {"uuid": "7b64d6b2-7d41-465a-aa16-e560aa01e21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44445", "type": "seen", "source": "https://t.me/cibsecurity/33910", "content": "\u203c CVE-2021-44445 \u203c\n\nA vulnerability has been identified in JT Utilities (All versions &lt; V13.1.1.0), JTTK (All versions &lt; V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15054)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:15.000000Z"}, {"uuid": "d74c58dc-8511-49a0-bd73-e1f10f3a9204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44448", "type": "seen", "source": "https://t.me/cibsecurity/33907", "content": "\u203c CVE-2021-44448 \u203c\n\nA vulnerability has been identified in JT Utilities (All versions &lt; V13.0.3.0), JTTK (All versions &lt; V11.0.3.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14843, ZDI-CAN-15051)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:11.000000Z"}, {"uuid": "527d88aa-607b-442f-b5d9-67586955f126", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44449", "type": "seen", "source": "https://t.me/cibsecurity/33911", "content": "\u203c CVE-2021-44449 \u203c\n\nA vulnerability has been identified in JT Utilities (All versions &lt; V12.8.1.1), JTTK (All versions &lt; V10.8.1.1). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14830)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:19.000000Z"}, {"uuid": "b3006326-74de-4368-968f-96588b16851c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44441", "type": "seen", "source": "https://t.me/cibsecurity/33903", "content": "\u203c CVE-2021-44441 \u203c\n\nA vulnerability has been identified in JT Utilities (All versions &lt; V13.1.1.0), JTTK (All versions &lt; V11.1.1.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14913)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:07.000000Z"}]}