{"vulnerability": "cve-2013-7285", "sightings": [{"uuid": "4937d559-4e8e-486f-91b7-57fa4130079a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-7285", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2917", "content": "#Threat_Research\nDocumented Vulnerabilities in XStream + Workarounds\n(PoCs for CVE-2021-21341-21351, CVE-2020-26217, CVE-2020-26258, CVE-2020-26259, CVE-2017-7957, CVE-2016-3674, CVE-2013-7285)\nhttp://x-stream.github.io/security.html", "creation_timestamp": "2021-03-16T11:01:03.000000Z"}, {"uuid": "0e23ae07-fbc8-46d5-9d46-26410fa35e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-7285", "type": "seen", "source": "https://t.me/cibsecurity/4332", "content": "ATENTION\u203c New - CVE-2013-7285\n\nXstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-15T20:33:21.000000Z"}]}