{"vulnerability": "cve-2021-4448", "sightings": [{"uuid": "9b1db978-404a-430d-a753-27eb3e21ca2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4448", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2021/CVE-2021-4448.yaml", "content": "", "creation_timestamp": "2025-12-30T13:10:46.000000Z"}, {"uuid": "995b3007-4348-4cd4-bde4-035a24ae98af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-4448", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mbcraiimvn2f", "content": "", "creation_timestamp": "2025-12-31T21:03:10.255722Z"}, {"uuid": "7b1e3a3e-c2bc-43e1-8dc7-86fbda0ac1eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44486", "type": "seen", "source": "https://t.me/cibsecurity/40957", "content": "\u203c CVE-2021-44486 \u203c\n\nAn issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T22:34:07.000000Z"}, {"uuid": "e26ef6df-c59c-45f9-b867-dfdf5878c00a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44480", "type": "seen", "source": "https://t.me/cibsecurity/33204", "content": "\u203c CVE-2021-44480 \u203c\n\nWokka Lokka Q50 devices through 2021-11-30 allow remote attackers (who know the SIM phone number and password) to listen to a device's surroundings via a callback in an SMS command, as demonstrated by the 123456 and 523681 default passwords.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-01T18:40:00.000000Z"}, {"uuid": "e48801de-c31c-4cc8-ad95-79fc727e1fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44481", "type": "seen", "source": "https://t.me/cibsecurity/40941", "content": "\u203c CVE-2021-44481 \u203c\n\nAn issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of parameter validation in calls to memcpy in check_and_set_timeout in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T22:33:45.000000Z"}, {"uuid": "4c8411c7-3ebf-4955-9671-3ac7265f82bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44482", "type": "seen", "source": "https://t.me/cibsecurity/40963", "content": "\u203c CVE-2021-44482 \u203c\n\nAn issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T22:36:48.000000Z"}]}