{"vulnerability": "cve-2016-1075", "sightings": [{"uuid": "50a04439-0891-45ed-8d19-5fcb1bf7e589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10750", "type": "seen", "source": "https://t.me/arpsyndicate/2611", "content": "#ExploitObserverAlert\n\nCVE-2016-10750\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2016-10750. In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.\n\nFIRST-EPSS: 0.026100000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-01-07T04:08:28.000000Z"}, {"uuid": "b532cddd-b9f8-4e04-8e72-a461afd02ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10750", "type": "seen", "source": "https://t.me/cibsecurity/4441", "content": "ATENTION\u203c New - CVE-2016-10750\n\nIn Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-22T18:29:12.000000Z"}, {"uuid": "7285e34c-d1a3-4bd9-86e0-9c398d9f0bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10752", "type": "seen", "source": "https://t.me/cibsecurity/4541", "content": "ATENTION\u203c New - CVE-2016-10752\n\nserendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by \"php\" as a filename.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:23.000000Z"}, {"uuid": "a870a64d-f889-429e-a696-cbf29543f747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10751", "type": "seen", "source": "https://t.me/cibsecurity/4542", "content": "ATENTION\u203c New - CVE-2016-10751\n\nosClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&amp;action=ajax_upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:24.000000Z"}, {"uuid": "6ed61887-32ad-49c4-85d7-06f57a084e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10759", "type": "seen", "source": "https://t.me/cibsecurity/4534", "content": "ATENTION\u203c New - CVE-2016-10759\n\nThe Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:16.000000Z"}, {"uuid": "a6d9b949-a913-49c2-a54d-b4ba5a996ea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10758", "type": "seen", "source": "https://t.me/cibsecurity/4535", "content": "ATENTION\u203c New - CVE-2016-10758\n\nPHPKIT 1.6.6 allows arbitrary File Upload, as demonstrated by a .php file to pkinc/admin/mediaarchive.php and pkinc/func/default.php via the image_name parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:17.000000Z"}, {"uuid": "b3cbbc6e-b691-4eca-b0cd-4fea0710051a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10757", "type": "seen", "source": "https://t.me/cibsecurity/4536", "content": "ATENTION\u203c New - CVE-2016-10757\n\nIn Redaxo 5.2.0, the cron management of the admin panel suffers from CSRF that leads to arbitrary Remote Code Execution via addons/cronjob/lib/types/phpcode.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:18.000000Z"}, {"uuid": "74f3f377-dbf2-4e54-bd92-f2b2a7a0ff31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10756", "type": "seen", "source": "https://t.me/cibsecurity/4537", "content": "ATENTION\u203c New - CVE-2016-10756\n\nKliqqi 3.0.0.5 allows CSRF with resultant Arbitrary File Upload because module.php?module=upload can be used to configure the uploading of .php files, and then modules/upload/upload_main.php can be used for the upload itself.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:19.000000Z"}, {"uuid": "02f31337-8472-4478-8759-e8ba40ca89a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10755", "type": "seen", "source": "https://t.me/cibsecurity/4538", "content": "ATENTION\u203c New - CVE-2016-10755\n\nAbanteCart 1.2.8 allows SQL Injection via the source_language parameter to admin/controller/pages/localisation/language.php and core/lib/language_manager.php, or via POST data to admin/controller/pages/tool/backup.php and admin/model/tool/backup.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:20.000000Z"}, {"uuid": "e6855c4d-301b-47f7-9d4d-3ef50af40648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10754", "type": "seen", "source": "https://t.me/cibsecurity/4539", "content": "ATENTION\u203c New - CVE-2016-10754\n\nmodules/Calendar/Activity.php in Vtiger CRM 6.5.0 allows SQL injection via the contactidlist parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:21.000000Z"}, {"uuid": "6b97703a-010a-43c2-b95d-d8049040bf91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10753", "type": "seen", "source": "https://t.me/cibsecurity/4540", "content": "ATENTION\u203c New - CVE-2016-10753\n\ne107 2.1.2 allows PHP Object Injection with resultant SQL injection, because usersettings.php uses unserialize without an HMAC.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-24T22:26:22.000000Z"}]}