ID

VAR-202106-1815


CVE

CVE-2021-27040


TITLE

Autodesk AutoCAD DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability

Trust: 2.8

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709

DESCRIPTION

A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code. Provided by Mitsubishi Electric Corporation GENESIS64 and MC Works64 of AutoCAD (DWG) The file import feature contains several vulnerabilities: It was * Out-of-bounds read (CWE-125) - CVE-2021-27040 ‥ * Out-of-bounds writing (CWE-787) - CVE-2021-27041 This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.* Crafted by a third party AutoCAD (DWG) Information leaks by importing the file into the product - CVE-2021-27040* Crafted by a third party AutoCAD (DWG) By importing the file into the product, any program will be executed. - CVE-2021-27041. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 9.09

sources: NVD: CVE-2021-27040 // JVNDB: JVNDB-2021-003350 // ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // CNNVD: CNNVD-202104-975

AFFECTED PRODUCTS

vendor:autodeskmodel:autocadscope: - version: -

Trust: 5.6

vendor:iconicsmodel:genesis64scope: - version: -

Trust: 2.1

vendor:autodeskmodel:autocad map 3dscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocadscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocadscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:advance steelscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:advance steelscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:advance steelscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:advance steelscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocadscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocadscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocadscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:dwg trueviewscope:ltversion:2022.1.1

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocadscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:advance steelscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:gteversion:2019

Trust: 1.0

vendor:mitsubishielectricmodel:mc works64scope:lteversion:4.04e

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:dwg trueviewscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:advance steelscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:autocadscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocadscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:lteversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad plant 3dscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocad electricalscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:autocad mepscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:gteversion:2019

Trust: 1.0

vendor:autodeskmodel:advance steelscope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:ltversion:2022.0.1

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:ltversion:2020.1.4

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:ltversion:2019.1.3

Trust: 1.0

vendor:autodeskmodel:autocad architecturescope:gteversion:2021

Trust: 1.0

vendor:autodeskmodel:autocad ltscope:gteversion:2021

Trust: 1.0

vendor:iconicsmodel:genesis64scope:lteversion:10.97

Trust: 1.0

vendor:autodeskmodel:autocad map 3dscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:advance steelscope:gteversion:2020

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:ltversion:2021.1.1

Trust: 1.0

vendor:autodeskmodel:civil 3dscope:gteversion:2022

Trust: 1.0

vendor:autodeskmodel:autocad mechanicalscope:gteversion:2019

Trust: 1.0

vendor:三菱電機model:genesis64scope: - version: -

Trust: 0.8

vendor:三菱電機model:mc works64scope: - version: -

Trust: 0.8

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // JVNDB: JVNDB-2021-003350 // NVD: CVE-2021-27040

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2021-27040
value: HIGH

Trust: 4.2

ZDI: CVE-2021-27040
value: LOW

Trust: 3.5

NVD: CVE-2021-27040
value: LOW

Trust: 1.0

OTHER: JVNDB-2021-003350
value: LOW

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-1561
value: LOW

Trust: 0.6

NVD: CVE-2021-27040
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

ZDI: CVE-2021-27040
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 4.2

ZDI: CVE-2021-27040
baseSeverity: LOW
baseScore: 3.3
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.0

Trust: 3.5

NVD: CVE-2021-27040
baseSeverity: LOW
baseScore: 3.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.1

Trust: 1.0

OTHER: JVNDB-2021-003350
baseSeverity: LOW
baseScore: 3.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // JVNDB: JVNDB-2021-003350 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1561 // NVD: CVE-2021-27040

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [ Other ]

Trust: 0.8

problemtype: Out-of-bounds read (CWE-125) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-003350 // NVD: CVE-2021-27040

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202106-1561

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

CONFIGURATIONS

sources: NVD: CVE-2021-27040

PATCH

title:Autodesk has issued an update to correct this vulnerability.url:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004

Trust: 4.9

title:ICONICS has issued an update to correct this vulnerability.url:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01

Trust: 1.4

title:GENESIS64 and MC Works64 of AutoCAD(DWG) Information leakage and malicious program execution vulnerability in file import functionurl:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2021-017.pdf

Trust: 0.8

title:ICONICS has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-294-01

Trust: 0.7

title:Autodesk has issued an update to correct this vulnerability.url:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007

Trust: 0.7

title:Autodesk AutoCAD Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155357

Trust: 0.6

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // JVNDB: JVNDB-2021-003350 // CNNVD: CNNVD-202106-1561

EXTERNAL IDS

db:NVDid:CVE-2021-27040

Trust: 10.1

db:ZDIid:ZDI-21-1238

Trust: 2.3

db:ZDIid:ZDI-21-1236

Trust: 2.3

db:ZDIid:ZDI-22-378

Trust: 2.3

db:ZDIid:ZDI-22-473

Trust: 2.3

db:ICS CERTid:ICSA-21-294-01

Trust: 1.4

db:ZDIid:ZDI-21-712

Trust: 1.3

db:JVNid:JVNVU94862669

Trust: 0.8

db:JVNDBid:JVNDB-2021-003350

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12150

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12119

Trust: 0.7

db:ZDIid:ZDI-21-711

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12118

Trust: 0.7

db:ZDIid:ZDI-21-710

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12117

Trust: 0.7

db:ZDIid:ZDI-21-709

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12094

Trust: 0.7

db:ZDIid:ZDI-21-708

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12077

Trust: 0.7

db:ZDIid:ZDI-21-707

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-12076

Trust: 0.7

db:ZDIid:ZDI-21-706

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-14065

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-14060

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-14059

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-15570

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021102205

Trust: 0.6

db:CS-HELPid:SB2021062421

Trust: 0.6

db:CS-HELPid:SB2022042625

Trust: 0.6

db:AUSCERTid:ESB-2021.3527

Trust: 0.6

db:CNNVDid:CNNVD-202106-1561

Trust: 0.6

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // JVNDB: JVNDB-2021-003350 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1561 // NVD: CVE-2021-27040

REFERENCES

url:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004

Trust: 7.3

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01

Trust: 2.8

url:https://www.zerodayinitiative.com/advisories/zdi-21-1236/

Trust: 2.2

url:https://www.zerodayinitiative.com/advisories/zdi-22-378/

Trust: 2.2

url:https://www.zerodayinitiative.com/advisories/zdi-21-1238/

Trust: 1.6

url:https://www.zerodayinitiative.com/advisories/zdi-22-473/

Trust: 1.6

url:http://jvn.jp/cert/jvnvu94862669/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27041

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27040

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-294-01

Trust: 0.7

url:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062421

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-21-712/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3527

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042625

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021102205

Trust: 0.6

url:https://vigilance.fr/vulnerability/iconics-genesis64-three-vulnerabilities-36698

Trust: 0.6

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378 // ZDI: ZDI-22-473 // JVNDB: JVNDB-2021-003350 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1561 // NVD: CVE-2021-27040

CREDITS

Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative

Trust: 7.0

sources: ZDI: ZDI-21-712 // ZDI: ZDI-21-711 // ZDI: ZDI-21-710 // ZDI: ZDI-21-709 // ZDI: ZDI-21-708 // ZDI: ZDI-21-707 // ZDI: ZDI-21-706 // ZDI: ZDI-21-1238 // ZDI: ZDI-21-1236 // ZDI: ZDI-22-378

SOURCES

db:ZDIid:ZDI-21-712
db:ZDIid:ZDI-21-711
db:ZDIid:ZDI-21-710
db:ZDIid:ZDI-21-709
db:ZDIid:ZDI-21-708
db:ZDIid:ZDI-21-707
db:ZDIid:ZDI-21-706
db:ZDIid:ZDI-21-1238
db:ZDIid:ZDI-21-1236
db:ZDIid:ZDI-22-378
db:ZDIid:ZDI-22-473
db:JVNDBid:JVNDB-2021-003350
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-1561
db:NVDid:CVE-2021-27040

LAST UPDATE DATE

2022-05-16T22:51:40.714000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-712date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-711date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-710date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-709date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-708date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-707date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-706date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-1238date:2021-10-28T00:00:00
db:ZDIid:ZDI-21-1236date:2021-10-28T00:00:00
db:ZDIid:ZDI-22-378date:2022-02-18T00:00:00
db:ZDIid:ZDI-22-473date:2022-03-07T00:00:00
db:JVNDBid:JVNDB-2021-003350date:2021-11-26T02:40:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-1561date:2022-05-16T00:00:00
db:NVDid:CVE-2021-27040date:2022-05-13T17:31:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-712date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-711date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-710date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-709date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-708date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-707date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-706date:2021-06-22T00:00:00
db:ZDIid:ZDI-21-1238date:2021-10-28T00:00:00
db:ZDIid:ZDI-21-1236date:2021-10-28T00:00:00
db:ZDIid:ZDI-22-378date:2022-02-18T00:00:00
db:ZDIid:ZDI-22-473date:2022-03-07T00:00:00
db:JVNDBid:JVNDB-2021-003350date:2021-10-25T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-1561date:2021-06-22T00:00:00
db:NVDid:CVE-2021-27040date:2021-06-25T13:15:00