{"vulnerability": "CVE-2021-4322", "sightings": [{"uuid": "187d9c15-6e71-4b09-bc68-db2b9fd2142e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-10-06T18:10:02.000000Z"}, {"uuid": "de7f72c8-d4f2-4563-adeb-efe2fb60e639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4868672", "content": "", "creation_timestamp": "2025-10-06T19:30:16.204671Z"}, {"uuid": "077f019b-c19c-40cd-acdc-ded84dd50933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m2kfskbfcq2u", "content": "", "creation_timestamp": "2025-10-06T20:03:14.631054Z"}, {"uuid": "404ed96f-36fe-4250-ad0e-58a517c9d821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m2lnwsnsgso2", "content": "", "creation_timestamp": "2025-10-07T08:01:56.698679Z"}, {"uuid": "0664a4a9-b9ec-417b-becb-55b1e19c1e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m2mzlenpki2n", "content": "", "creation_timestamp": "2025-10-07T21:02:44.144209Z"}, {"uuid": "842e2fce-5a3d-411f-b047-966c6dfb12d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m2oapjyaac2m", "content": "", "creation_timestamp": "2025-10-08T08:42:58.461689Z"}, {"uuid": "6f64a86c-636f-4d9b-9b11-5fe3cd615227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-43226", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/4b092c95-342f-4389-97b6-c05e3b92fe53", "content": "", "creation_timestamp": "2026-02-02T12:25:51.024964Z"}, {"uuid": "8de85956-b456-4885-a644-6215bdafd3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3m2lkbmt4e22h", "content": "", "creation_timestamp": "2025-10-07T06:56:00.581330Z"}, {"uuid": "94a0fee6-2bc7-456d-944a-98e0b4352ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43226", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-10-07T03:22:07.000000Z"}, {"uuid": "822d8459-0950-4a8e-9871-eacf124d9efe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43224", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/566", "content": "Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries\nhttps://github.com/cyberstruggle/L4sh\n\nLog4j Scanner coded in Powershell\nhttps://github.com/Maelstromage/Log4jSherlock\n\nopen detection and scanning tool for discovering and fuzzing for Log4J RCE\nhttps://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit\n\nCVE-2021-22005 vulnerability which exists in the analysis service of vCenter Server\nhttps://github.com/shmilylty/cve-2021-22005-exp\n\nWindows Common Log File System Driver poc\nhttps://github.com/KaLendsi/CVE-2021-43224-POC", "creation_timestamp": "2021-12-28T17:49:54.000000Z"}, {"uuid": "d1d30901-5f5c-43d8-85a1-017031ff58f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43224", "type": "published-proof-of-concept", "source": "https://t.me/m1swarr1or/37", "content": "https://github.com/KaLendsi/CVE-2021-43224-POC ( BSOD )\n\n#exploit #windows #driver", "creation_timestamp": "2024-08-30T04:35:56.000000Z"}, {"uuid": "29ea3adc-870a-4ead-a9b8-35a351b2ff16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4322", "type": "seen", "source": "https://t.me/cibsecurity/67400", "content": "\u203c CVE-2021-4322 \u203c\n\nUse after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-29T07:40:24.000000Z"}, {"uuid": "63fdc6d6-d314-4998-a8c3-c4af6ae4a3f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43224", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5031", "content": "#exploit\n1. CVE-2021-4061:\nType Confusion in V8\nhttps://github.com/msrkp/exploits/tree/main/CVE-2021-4061\n\n2. CVE-2021-43224:\nWindows Common Log File System Driver PoC\nhttps://github.com/KaLendsi/CVE-2021-43224-POC", "creation_timestamp": "2021-12-22T11:12:01.000000Z"}, {"uuid": "8e408e41-ef2f-44f4-976b-1b0df38b1d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43222", "type": "seen", "source": "https://t.me/cibsecurity/34027", "content": "\u203c CVE-2021-43222 \u203c\n\nMicrosoft Message Queuing Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43236.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-15T18:14:51.000000Z"}, {"uuid": "27303a37-e910-4788-a951-ce50119efa48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43224", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1556", "content": "#exploit\n\n1. CVE-2021-4061:\nType Confusion in V8\nhttps://github.com/msrkp/exploits/tree/main/CVE-2021-4061\n\n2. CVE-2021-43224:\nWindows Common Log File System Driver PoC\nhttps://github.com/KaLendsi/CVE-2021-43224-POC\n\n@BlueRedTeam", "creation_timestamp": "2021-12-22T10:04:53.000000Z"}]}