{"vulnerability": "cve-2016-1003", "sightings": [{"uuid": "5f345127-5b40-4a2b-88af-ddcdf0c5dfa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/spammermarketool/39118", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "5a6e93b6-c924-4f9a-9d2e-7de074567f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/spammerspacer/33792", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "02cad80f-9960-458b-ba04-d71bcef62442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/741", "content": "WordPress Core 4.6 - Unauthenticated Remote Code Execution (RCE) PoC Exploit\nhttps://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html?source=post_page---------------------------", "creation_timestamp": "2024-12-05T12:39:55.000000Z"}, {"uuid": "4867d19d-04a2-483f-b5f6-3ddf3ed8184e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/507", "content": "CVE ID : CVE-2016-10033\nSystem : wordpress 4.6\nType : RCE\n\nExploit :\n\npython2 CVE-2016-10033.py http://exmple.com/ 1.2.3.4:4444 user", "creation_timestamp": "2024-12-05T13:07:20.000000Z"}, {"uuid": "35cde3da-6036-413e-ab85-4e44423ac619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10034", "type": "seen", "source": "https://t.me/arpsyndicate/4833", "content": "#ExploitObserverAlert\n\nCVE-2016-10034\n\nDESCRIPTION: Exploit Observer has 294 entries in 19 file formats related to CVE-2016-10034. The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \\\" (backslash double quote) in a crafted e-mail address.\n\nFIRST-EPSS: 0.964080000\nNVD-IS: 5.9\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9680715", "creation_timestamp": "2024-04-24T22:29:01.000000Z"}, {"uuid": "f5d19876-f630-41c8-89e9-83352b3a497d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/489", "content": "EE | PhpMailer RCE | http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html", "creation_timestamp": "2016-12-26T14:11:15.000000Z"}, {"uuid": "60b69e60-9775-4017-979b-038151729c34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://www.exploit-db.com/exploits/42024", "content": "", "creation_timestamp": "2017-05-17T00:00:00.000000Z"}, {"uuid": "b6791ac6-acf7-44ec-a364-296dd0cd9faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-1003", "type": "exploited", "source": "https://www.exploit-db.com/exploits/41688", "content": "", "creation_timestamp": "2016-12-26T00:00:00.000000Z"}, {"uuid": "1fd58379-ba82-4e53-8af4-dd9e39dd6172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://www.exploit-db.com/exploits/40968", "content": "", "creation_timestamp": "2016-12-26T00:00:00.000000Z"}, {"uuid": "39887c79-6cb3-44b5-93aa-aa832d050d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10031", "type": "exploited", "source": "https://www.exploit-db.com/exploits/40967", "content": "", "creation_timestamp": "2016-12-26T00:00:00.000000Z"}, {"uuid": "d6f7e326-ad06-43d1-9f0e-421c9975bbff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114813266893249320", "content": "", "creation_timestamp": "2025-07-07T18:03:41.799432Z"}, {"uuid": "9c7ee794-5a5d-49d4-b929-79f436ce2d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4361751", "content": "", "creation_timestamp": "2025-07-07T19:01:12.993729Z"}, {"uuid": "cefb66a4-922a-449e-8b26-91f6df79cef0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3ltfldvi3lm2e", "content": "", "creation_timestamp": "2025-07-07T20:02:46.047976Z"}, {"uuid": "592c6be4-e6b4-41cb-9323-c9fe0a750276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltflg2zsak2o", "content": "", "creation_timestamp": "2025-07-07T20:03:59.779492Z"}, {"uuid": "4845bba0-9a07-4775-a415-1de9629dfc04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3ltl4bgrugy2e", "content": "", "creation_timestamp": "2025-07-10T00:48:55.404715Z"}, {"uuid": "5011f251-4c6a-4537-b4cc-cc9c112df11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://gist.github.com/diogorpm/0c1d873152e9b20b8b84ed067bde9901", "content": "", "creation_timestamp": "2025-05-13T00:55:51.000000Z"}, {"uuid": "6cf67319-8a0c-4774-ac3b-83a2fcb84239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:13.000000Z"}, {"uuid": "5972245e-8c8c-4d17-8800-66a52f403131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/6129", "content": "WordPress Core 4.6 - Unauthenticated Remote Code Execution (RCE) PoC Exploit\nhttps://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html?source=post_page---------------------------", "creation_timestamp": "2024-12-05T12:39:55.000000Z"}, {"uuid": "3462e4f5-d09d-481c-9d05-291aed84762c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "Telegram/xwFZjxwcP1O07AW4YJlnydOoKxB3PkelKAoKwoxWfLu0", "content": "", "creation_timestamp": "2024-05-18T19:38:43.000000Z"}, {"uuid": "1f66b4d0-b968-4b28-bf45-3bd255a5a4ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/107", "content": "CVE ID : CVE-2016-10033\nSystem : wordpress 4.6\nType : RCE\n\nExploit\n \u0637\u0631\u064a\u0642\u0629 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\n\npython2 CVE-2016-10033.py   \n\nexmple \u0645\u062b\u0627\u0644 :\n\npython2 CVE-2016-10033.py http://exmple.com   1.1.1.1:1337 admin", "creation_timestamp": "2024-05-09T18:09:18.000000Z"}, {"uuid": "befc6b19-795e-4ac8-a4cf-805c91d3764c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "Telegram/xKQG92GAEvbSnroBQjDjZcbZhZYqgv_RfZJJxSMddxWbWNo", "content": "", "creation_timestamp": "2025-04-25T23:00:05.000000Z"}, {"uuid": "b9efa363-ded1-4f6b-8f3a-1f276d891fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "Telegram/dt3wzguPwvHeMGbS-iOOUe43Y1n6HJwkKjrvq5BX_wYbkhfe", "content": "", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}, {"uuid": "c3187fb9-92a3-4c0b-bf51-4c5b89a2528a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "Telegram/qA7RHbfeiqXzFaQFtQDWHegpUj17EgvuINx_Fz9sXMRGmneY", "content": "", "creation_timestamp": "2022-06-20T20:34:58.000000Z"}, {"uuid": "dc9ccf03-8f0c-4c17-a992-ca35a4cacfe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:42.000000Z"}, {"uuid": "ba45346b-4be0-447b-98d3-c7ff8291e6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltfoohbsby2p", "content": "", "creation_timestamp": "2025-07-07T21:02:21.247041Z"}, {"uuid": "2c8468c7-e864-43b7-9019-6484de6da098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://gist.github.com/JohnPeng47/5146feaf5e65230c9c09b4348ebe205b", "content": "", "creation_timestamp": "2025-04-23T21:32:11.000000Z"}, {"uuid": "b6baaec3-c0d2-47d1-94eb-76d010dd6bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lth56u5i4me2", "content": "", "creation_timestamp": "2025-07-08T10:55:02.984437Z"}, {"uuid": "f02d97b7-b849-4dce-bb4e-e8fd80399ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3lvcezts7ri2h", "content": "", "creation_timestamp": "2025-08-01T00:22:09.741793Z"}, {"uuid": "d5096fbf-d15a-4a05-9db4-c1522e611bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/phpmailer_arg_injection.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "cc246861-7f86-453f-a6b1-ee0515408b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e3518128-3fbc-4333-ba02-a26c1521c33f", "content": "", "creation_timestamp": "2026-02-02T12:25:57.739293Z"}, {"uuid": "6d64d44e-5785-46ca-bcf7-f16c629ba56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/8015", "content": "CVE ID : CVE-2016-10033\nSystem : wordpress 4.6\nType : RCE\n\nExploit\n \u0637\u0631\u064a\u0642\u0629 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\n\npython2 CVE-2016-10033.py   \n\nexmple \u0645\u062b\u0627\u0644 :\n\npython2 CVE-2016-10033.py http://exmple.com   1.1.1.1:1337 admin", "creation_timestamp": "2024-06-19T01:30:22.000000Z"}, {"uuid": "c4f24a88-a7cd-492f-8ae4-fe03adfe417a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "Telegram/xeVTQce-zOalovki4RG1r8TVNFrP1uaoAaJdsXmjgqL5jzH-", "content": "", "creation_timestamp": "2024-05-18T14:17:33.000000Z"}, {"uuid": "741d3908-6df9-4e27-8f15-ef86a3d743cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/ashaburroyah313/366", "content": "WordPress Core 4.6 - Unauthenticated Remote Code Execution (RCE) PoC Exploit\nhttps://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html", "creation_timestamp": "2023-02-19T12:17:52.000000Z"}, {"uuid": "b041e662-bf77-43f2-a2c9-ebc519712a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/LeakingXTeam/20993", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}, {"uuid": "682d4fd9-2a83-419b-81d3-ed62a29490ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://t.me/information_security_channel/3053", "content": "Update: PHPMailer RCE (CVE-2016-10033) Exploit Code Released https://t.co/3RBzWzfpLM https://t.co/MjcAUzxoEt", "creation_timestamp": "2016-12-27T12:16:13.000000Z"}, {"uuid": "6a247fad-7ed1-430f-8e34-f4a65201a9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://t.me/information_security_channel/3057", "content": "RT @TheHackersNews: Update: PHPMailer RCE (CVE-2016-10033) Exploit Code Released https://t.co/3RBzWzfpLM https://t.co/MjcAUzxoEt", "creation_timestamp": "2016-12-27T17:05:30.000000Z"}, {"uuid": "81fb467f-9c0b-412c-a95a-7c2f08a799f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "published-proof-of-concept", "source": "https://t.me/hackingtoolsprvi8/2727", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}, {"uuid": "29a77afe-8e1d-4ff1-8b61-0758b5d816cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:44.000000Z"}, {"uuid": "02cbd5df-a8e3-4b67-bfd9-9fd93148b4ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lti73yfg5k2a", "content": "", "creation_timestamp": "2025-07-08T21:01:40.186280Z"}, {"uuid": "3e78e948-3537-488e-acc3-eb13aa9f5a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/buzzleaktv.bsky.social/post/3ltjafnjiyz2r", "content": "", "creation_timestamp": "2025-07-09T06:57:31.824581Z"}, {"uuid": "c641a1fc-a489-428c-ab9e-58e2dd47759f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://bsky.app/profile/upguard.bsky.social/post/3ltx3nucjoc26", "content": "", "creation_timestamp": "2025-07-14T19:09:56.794029Z"}, {"uuid": "fb4b5330-58c6-48ea-b6a0-70dccbf680b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "eaa65653-d75b-4db3-9d02-5685dfa33e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:30.000000Z"}, {"uuid": "51fd437b-90f4-482b-8439-509c5e131308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "seen", "source": "https://gist.github.com/CRCError111/c9826d1e721e62da3006bd274ab83b4b", "content": "", "creation_timestamp": "2026-01-25T08:02:56.000000Z"}, {"uuid": "c5a292b0-1b6c-4a25-99da-f92155499db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-10033", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e3518128-3fbc-4333-ba02-a26c1521c33f", "content": "", "creation_timestamp": "2026-02-02T12:25:57.739293Z"}]}