{"uuid": "749ec8dc-fab3-4c45-8daf-85c4c90fc7cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8120", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/105", "content": "#Threat_Research\n1. Technical Rundown of WebExec\nhttps://webexec.org\n]-&gt; https://blog.skullsecurity.org/2018/technical-rundown-of-webexec\n2. Understanding how DLL Hijacking works\nhttps://astr0baby.wordpress.com/2018/09/08/understanding-how-dll-hijacking-works\n3. A detailed technical explanation of CVE-2018-8120\nhttps://xiaodaozhi.com/exploit/156.html", "creation_timestamp": "2023-10-26T20:27:01.000000Z"}