{"vulnerability": "CVE-2021-2007", "sightings": [{"uuid": "44039614-9956-4adc-ab22-b164dc4422c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-2007", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "0bcc4eb8-c036-41d2-8656-53a35efb1ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20076", "type": "seen", "source": "https://t.me/cibsecurity/24410", "content": "\u203c CVE-2021-20076 \u203c\n\nTenable.sc and Tenable.sc Core versions 5.13.0 through 5.17.0 were found to contain a vulnerability that could allow an authenticated, unprivileged user to perform Remote Code Execution (RCE) on the Tenable.sc server via Hypertext Preprocessor unserialization.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-03T20:45:47.000000Z"}, {"uuid": "8387e192-dd7d-4d9f-98ea-a0a21646a0be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20077", "type": "seen", "source": "https://t.me/cibsecurity/25191", "content": "\u203c CVE-2021-20077 \u203c\n\nNessus Agent versions 7.2.0 through 8.2.2 were found to inadvertently capture the IAM role security token on the local host during initial linking of the Nessus Agent when installed on an Amazon EC2 instance. This could allow a privileged attacker to obtain the token.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-19T21:33:30.000000Z"}, {"uuid": "f7815bee-150d-48a4-a4fe-48f7ad1ae88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20071", "type": "seen", "source": "https://t.me/cibsecurity/23676", "content": "\u203c CVE-2021-20071 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the sms.php dialogs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:06.000000Z"}, {"uuid": "21bc01af-4e07-4461-9129-1ba325e81c4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20072", "type": "seen", "source": "https://t.me/cibsecurity/23675", "content": "\u203c CVE-2021-20072 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to arbitrarily access and delete files via an authenticated directory traveral.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:05.000000Z"}, {"uuid": "90cfa799-5de4-4182-b16e-b102ae5ef1d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20074", "type": "seen", "source": "https://t.me/cibsecurity/23673", "content": "\u203c CVE-2021-20074 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows users to escape the provided command line interface and execute arbitrary OS commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:03.000000Z"}, {"uuid": "9a2d6f66-1f39-48bf-81ce-805f3280afbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20073", "type": "seen", "source": "https://t.me/cibsecurity/23671", "content": "\u203c CVE-2021-20073 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows for cross-site request forgeries.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:01.000000Z"}, {"uuid": "f8139970-d444-47c1-af22-d73dba17ac5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20075", "type": "seen", "source": "https://t.me/cibsecurity/23681", "content": "\u203c CVE-2021-20075 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows for privilege escalation via configd.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:14.000000Z"}, {"uuid": "2bddad27-3f29-49cf-af95-e5b1e096d433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-20070", "type": "seen", "source": "https://t.me/cibsecurity/23678", "content": "\u203c CVE-2021-20070 \u203c\n\nRacom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the virtualization.php dialogs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-16T22:48:08.000000Z"}]}