{"vulnerability": "CVE-2016-1000", "sightings": [{"uuid": "5654a757-4f08-4598-a772-93e2f0272dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000031", "type": "seen", "source": "MISP/5be322d8-035c-4ef4-8bb6-4a870a021402", "content": "", "creation_timestamp": "2018-11-07T17:40:59.000000Z"}, {"uuid": "636c3670-de7d-4277-b7b7-ab5b8e69123e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "exploited", "source": "https://www.exploit-db.com/exploits/40963", "content": "", "creation_timestamp": "2016-12-23T00:00:00.000000Z"}, {"uuid": "16a60986-3efe-48cb-b1b0-7df3391791be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000", "type": "exploited", "source": "https://www.exploit-db.com/exploits/39610", "content": "", "creation_timestamp": "2016-03-23T00:00:00.000000Z"}, {"uuid": "183eb476-d5cf-4c00-8480-e85ad3f336f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-100028", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:42.000000Z"}, {"uuid": "28b056b8-0ceb-437a-b5f5-e88f36f22c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "99833fb4-63c8-4ec7-a4cf-55d3285596b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "seen", "source": "https://gist.github.com/SWORDIntel/971b083b42de77b48b93a5446d96e9cf", "content": "", "creation_timestamp": "2025-02-21T05:29:01.000000Z"}, {"uuid": "f771c9c7-94c4-4e89-82c8-085dddf1751f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-100028", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:44.000000Z"}, {"uuid": "82788181-cd9d-4cb3-b3aa-9622fe693c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000027", "type": "seen", "source": "https://bsky.app/profile/msw.bsky.social/post/3lrexyicuzs2f", "content": "", "creation_timestamp": "2025-06-12T03:25:59.992687Z"}, {"uuid": "6be249c3-0281-4e1b-a03b-4e86d6ae41f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000027", "type": "seen", "source": "https://bsky.app/profile/msw.bsky.social/post/3lreyahne4c2f", "content": "", "creation_timestamp": "2025-06-12T03:30:28.069382Z"}, {"uuid": "5bb4826b-f8d4-462c-b99a-89a326766127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "published-proof-of-concept", "source": "https://t.me/antichat/2044", "content": "#linux #unix #exploit #\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\n\n\u041f\u043e\u0431\u043e\u043b\u044c\u0448\u0435 \u043e\u0431 OpenSSH\n\nOpenSSH \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043c\u0430\u043b\u044b\u043c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445. \u0418 \u043f\u043e\u0445\u043e\u0436\u0435 \u043a\u0430\u043a \u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0435 - \u0447\u0430\u0441\u0442\u043e\u0439 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u043c\u043e\u0441\u0442\u044c\u044e \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0447\u0435\u043d\u044c \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439. \u0415\u0441\u043b\u0438 \u0440\u0438\u0441\u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0435 \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442 \u043d\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u0437\u0430\u0433\u043b\u044f\u043d\u0443\u0442\u044c \u043d\u0430 \u043f\u0430\u0440\u0443 \u043b\u0435\u0442 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u0435 \u0438 \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c, \u0447\u0435\u043c \u0435\u0449\u0435 \u043e\u043f\u0430\u0441\u043d\u044b \u0441\u0442\u0430\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 OpenSSH:\n\nCVE-2016-10009 - \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 7.4 - \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c OpenSSH \u043d\u0430 \u041a\u041b\u0418\u0415\u041d\u0422\u0415 \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 (\u044f\u043a\u043e\u0431\u044b \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 PKCS11), \u0435\u0441\u043b\u0438 \u0443 \u0438\u043d\u0438\u0446\u0438\u0430\u0442\u043e\u0440\u0430 \u0431\u0435\u0437\u043e\u0431\u0440\u0430\u0437\u0438\u044f \u0435\u0441\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0436\u0435\u043b\u0430\u0435\u043c\u0443\u044e \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0443 \u043a\u043b\u0438\u0435\u043d\u0442\u0430. \u041f\u0440\u0438\u043c\u0435\u0440 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438: https://www.exploit-db.com/exploits/40963/\n\nCVE-2016-10010 - \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 7.4 - \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e \u0440\u0443\u0442\u0430 \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043a \u0441\u043e\u043a\u0435\u0442\u0430\u043c \u0434\u043e\u043c\u0435\u043d\u0430 Unix, \u0435\u0441\u043b\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u043e UsePrivilegeSeparation. \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40962.zip\n\n\u0410 \u0435\u0449\u0435 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 7.4 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u043b\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 \u0432\u0435\u0440\u0441\u0438\u0438 1 SSH \u0438 \u0448\u0438\u0444\u0440\u043e\u0432 Blowfish, RC4 \u0438 3DES-CBC \u0438 RSA-\u043a\u043b\u044e\u0447\u0435\u0439 \u043a\u043e\u0440\u043e\u0447\u0435 1024 \u0431\u0438\u0442.\n\nCVE-2016-6210 - \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 7.3 - \u0435\u0449\u0435 \u043e\u0434\u043d\u0430 \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u0442\u043e\u043c, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u043b\u0438 \u0437\u0430\u0434\u0430\u043d\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c. \u0427\u0435\u0440\u0435\u0437 \u0440\u0430\u0437\u043d\u0438\u0446\u0443 \u0432\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0445\u0435\u0448\u0435\u0439 BLOWFISH \u0438 SHA256/SHA512. \u0421\u043a\u0440\u0438\u043f\u0442: https://www.exploit-db.com/exploits/40136/\n\nCVE-2016-6515 - \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 7.3 - \u044d\u0442\u043e \u043f\u0440\u043e\u0441\u0442\u043e DoS: https://www.exploit-db.com/exploits/40888/\n\nCVE-2015-6565 - \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 6.8 \u0438 6.9 - \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u0444\u0430\u0439\u043b\u044b \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 PTY. \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442: https://www.exploit-db.com/exploits/45280/", "creation_timestamp": "2018-08-29T07:58:51.000000Z"}, {"uuid": "514ae06e-d3c6-4f28-a69d-d1ddbbcb71af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-100005", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpsoe5oluc2a", "content": "", "creation_timestamp": "2025-05-23T03:20:25.296055Z"}, {"uuid": "f3c6946e-4170-4fbe-9f29-89f56db84262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10006", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwud77izd22t", "content": "", "creation_timestamp": "2025-08-20T21:02:30.147517Z"}, {"uuid": "e9ee5903-6c26-4931-9b5a-8be61730a1a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2016-1000338", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0292/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "b75448e1-979e-4bf9-90ee-3a1c139ca845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2016-1000342", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0292/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "ecdf3de8-4bad-439a-990e-8b5783b1df03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2016-1000031", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-apache-strutsin-tiedostonlatauskomponentissa", "content": "", "creation_timestamp": "2018-12-31T09:45:31.000000Z"}, {"uuid": "6a39142a-ea23-4b46-9362-c77d67fe2f6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000282", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/smtp/haraka.py", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "a0ee85a3-6536-4da1-a296-27203196e6a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2016-1000340", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0292/", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "5b7bbd69-1c61-4e1c-8c8a-4a728aec3bcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000217", "type": "seen", "source": "https://gist.github.com/alon710/76df39e1185c6e2d8335c296e945a30e", "content": "", "creation_timestamp": "2026-01-24T21:30:41.000000Z"}, {"uuid": "ce274dfc-f59c-4d05-aa4b-8a8de8da6e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000217", "type": "seen", "source": "https://gist.github.com/alon710/4dab8bcbfe5b3e06b2ed1b1f18ea7712", "content": "", "creation_timestamp": "2026-01-24T21:30:39.000000Z"}, {"uuid": "bccf190c-5a26-4af9-a96f-6194d1b90d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000217", "type": "seen", "source": "https://gist.github.com/alon710/39c2c0d2266790266586429dad824b6f", "content": "", "creation_timestamp": "2026-01-24T22:42:41.000000Z"}, {"uuid": "4e61728f-3142-48b8-a396-c222d56a9908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000027", "type": "published-proof-of-concept", "source": "Telegram/3pBq5cR6IlqeDtmbK0wx8m04HXDRqV_g5yEoTFBTOYd5yjQ", "content": "", "creation_timestamp": "2026-01-07T03:00:06.000000Z"}, {"uuid": "45c95f66-be21-4dc1-a61e-f79b5cab7b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "seen", "source": "Telegram/lSatndSHKvXeOOkCe4BtgugIcZcDihrdZBJA4iXwuYPkAsH3oA", "content": "", "creation_timestamp": "2025-08-17T02:42:32.000000Z"}, {"uuid": "33e45750-7abb-4803-9b76-15d97877f371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10573", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "e3e8395c-6dfd-4fff-8828-b34a349562e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2960", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "8cfe54be-e670-469f-9dea-53ef769c660b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10009", "type": "seen", "source": "Telegram/8z3H3fI-qze-XIkRpbGpPeozYKnU3kZrdFmJVdVOhRYR4Tl9", "content": "", "creation_timestamp": "2024-08-12T22:57:13.000000Z"}, {"uuid": "5b1a5ed5-d092-4d85-884f-0b4f8d1e2eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000229", "type": "seen", "source": "https://t.me/ctinow/209431", "content": "https://ift.tt/WsfI89L\nCVE-2016-1000229 | Swagger-UI Key Name cross site scripting (RHSA-2017:0868 / BID-97580)", "creation_timestamp": "2024-03-16T09:22:09.000000Z"}, {"uuid": "743a6779-1591-43ec-aa39-2cfd44b1b43b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000229", "type": "published-proof-of-concept", "source": "Telegram/oG5bcDupILYTiSvLrLyuoT30w-kSnnX732ONKp3s5pU3PI0", "content": "", "creation_timestamp": "2025-03-20T22:00:05.000000Z"}, {"uuid": "4d2e37c0-c3ec-4b2c-907a-8be301ad358f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000029", "type": "seen", "source": "https://t.me/ctinow/210282", "content": "https://ift.tt/Zf07eYs\nCVE-2016-1000029 | Tenable Nessus up to 6.7 UI Stored cross site scripting (Nessus ID 92465 / BID-92134)", "creation_timestamp": "2024-03-18T09:11:16.000000Z"}, {"uuid": "194d1ed0-75d2-48f0-8c45-6f2489636ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000028", "type": "seen", "source": "https://t.me/ctinow/210281", "content": "https://ift.tt/YkCzt05\nCVE-2016-1000028 | Tenable Nessus up to 6.7 UI Stored cross site scripting (Nessus ID 92465 / BID-92134)", "creation_timestamp": "2024-03-18T09:11:15.000000Z"}, {"uuid": "c8a3e4f4-0284-428c-9b37-89290b72e1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000022", "type": "seen", "source": "https://t.me/ctinow/209430", "content": "https://ift.tt/jqZL8no\nCVE-2016-1000022 | negotiator up to 0.6.0 Regular Expression resource consumption (RHSA-2016:1605 / Nessus ID 119377)", "creation_timestamp": "2024-03-16T09:22:07.000000Z"}, {"uuid": "dd2736a1-f300-48bf-b8c7-f76257ff0eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000110", "type": "seen", "source": "https://t.me/ctinow/195691", "content": "https://ift.tt/VjQ7yx6\nCVE-2016-1000110 | Python up to 2.7.11 CGI Script CGIHandler HTTP_PROXY redirect (Nessus ID 96165 / ID 14611)", "creation_timestamp": "2024-02-28T17:47:07.000000Z"}, {"uuid": "a5dcc9c9-90db-449c-b394-2dad5fac7987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000108", "type": "seen", "source": "https://t.me/ctinow/203905", "content": "https://ift.tt/GXws6vM\nCVE-2016-1000108 | Yaws up to 2.0.3 HTTP_PROXY redirect", "creation_timestamp": "2024-03-09T12:11:26.000000Z"}, {"uuid": "e9077e76-101b-4fcf-ad35-2ec7f136eadc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000107", "type": "seen", "source": "https://t.me/ctinow/203904", "content": "https://ift.tt/UdC2Ycx\nCVE-2016-1000107 | Erlang up to 22.1 inets HTTP_PROXY redirect", "creation_timestamp": "2024-03-09T12:11:24.000000Z"}, {"uuid": "b60b0361-61a2-459d-9b6b-b3fec966764d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000037", "type": "seen", "source": "https://t.me/ctinow/179076", "content": "https://ift.tt/f1lwsjM\nCVE-2016-1000037 | Pagure Attachment Endpoint cross site scripting (Nessus ID 93086 / ID 867773)", "creation_timestamp": "2024-02-05T09:41:36.000000Z"}, {"uuid": "40407990-5cac-4a9d-9a5c-4b36e842996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000236", "type": "seen", "source": "https://t.me/ctinow/192035", "content": "https://ift.tt/O53kGUY\nCVE-2016-1000236 | Node-cookie-signature up to 1.0.5 Comparison race condition", "creation_timestamp": "2024-02-23T18:51:58.000000Z"}, {"uuid": "9ecdec75-bae5-49ed-9e5f-45e48c0e7c59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000006", "type": "seen", "source": "https://t.me/ctinow/191972", "content": "https://ift.tt/FVR6CqX\nCVE-2016-1000006 | HHVM up to 3.12.10 __construct use after free", "creation_timestamp": "2024-02-23T17:46:40.000000Z"}, {"uuid": "2b30b81b-0a0a-438c-b1d8-0bbc66ee1cd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000002", "type": "seen", "source": "https://t.me/ctinow/178732", "content": "https://ift.tt/heAr7uZ\nCVE-2016-1000002 | gdm3 up to 3.14.1 Screen Lock information disclosure", "creation_timestamp": "2024-02-04T09:16:19.000000Z"}, {"uuid": "31e6cf9d-3d74-4834-a1f2-1ce1479b35d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000031", "type": "seen", "source": "https://t.me/ctinow/165073", "content": "https://ift.tt/6nrJDtz\nCVE-2016-1000031 | Oracle SOA Suite 12.2.1.3.0 Apache Commons FileUpload access control (BID-93604)", "creation_timestamp": "2024-01-09T15:46:57.000000Z"}, {"uuid": "3df7c0ee-5eec-4749-afb4-804c8849fbec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000276", "type": "seen", "source": "https://t.me/cibsecurity/2380", "content": "ATENTION\u203c New - CVE-2016-1000276\n\nAudacity version 2.1.2 is vulnerable to DLL Hijack, it tries to load avformat-55.dll without supplying the absolute path, thus relying upon the presence of such DLL on the system directory. This behavior results in an exploitable DLL Hijack vulnerability, even if the SafeDllSerchMode flag is enabled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-02-05T00:21:22.000000Z"}, {"uuid": "b723421c-9fc2-44ac-aa45-f27e7caccb83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000031", "type": "seen", "source": "https://t.me/ctinow/165026", "content": "https://ift.tt/gs48U3M\nCVE-2016-1000031 | Oracle Virtual Directory 11.1.1.9.0 Apache Commons FileUpload access control (BID-93604)", "creation_timestamp": "2024-01-09T14:46:39.000000Z"}, {"uuid": "43afce1c-ec0b-4c7a-96e7-10539d7d3392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000271", "type": "seen", "source": "https://t.me/cibsecurity/2381", "content": "ATENTION\u203c New - CVE-2016-1000271\n\nJoomla extension DT Register version before 3.1.12 (Joomla 3.x) / 2.8.18 (Joomla 2.5) contains an SQL injection in \"/index.php?controller=calendar&amp;format=raw&amp;cat[0]=SQLi&amp;task=events\". This attack appears to be exploitable if the attacker can reach the web server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-02-05T00:21:23.000000Z"}, {"uuid": "21b42ce2-a642-40c5-8c1f-15b1834199ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000282", "type": "seen", "source": "https://t.me/cibsecurity/2401", "content": "ATENTION\u203c New - CVE-2016-1000282\n\nHaraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-02-05T20:22:28.000000Z"}, {"uuid": "c59d662d-075d-4128-ad3c-4ef5ef84d0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000029", "type": "seen", "source": "https://t.me/cibsecurity/8880", "content": "ATENTION\u203c New - CVE-2016-1000029\n\nTenable Nessus before 6.8 has a stored XSS issue that requires admin-level authentication to the Nessus UI, and would potentially impact other admins (Tenable IDs 5218 and 5269).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-12-27T18:40:09.000000Z"}, {"uuid": "061cb6b3-441d-4ddc-b120-73bd3456d9cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000028", "type": "seen", "source": "https://t.me/cibsecurity/8881", "content": "ATENTION\u203c New - CVE-2016-1000028\n\nTenable Nessus before 6.8 has a stored XSS issue that requires admin-level authentication to the Nessus UI, and would only potentially impact other admins. (Tenable ID 5198).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-12-27T18:40:10.000000Z"}, {"uuid": "96b0a14d-a3e3-4e35-b46b-130b9ee5ed32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-1000111", "type": "seen", "source": "https://t.me/cibsecurity/10461", "content": "ATENTION\u203c New - CVE-2016-1000111\n\nTwisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-11T23:32:08.000000Z"}]}