{"vulnerability": "CVE-2018-16323", "sightings": [{"uuid": "d875479a-cb53-4a09-a489-7a9a5348c01e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-16323", "type": "published-proof-of-concept", "source": "https://t.me/antichat/2686", "content": "Yet another memory leak in ImageMagick or how to exploit CVE-2018\u201316323.\nhttps://medium.com/@ilja.bv/yet-another-memory-leak-in-imagemagick-or-how-to-exploit-cve-2018-16323-a60f048a1e12", "creation_timestamp": "2018-11-19T21:05:20.000000Z"}, {"uuid": "d02aa64c-3ec2-418c-94ab-b63964aeb52a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-16323", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/4772", "content": "Yet another memory leak in ImageMagick or how to exploit CVE-2018\u201316323.\nhttps://medium.com/@ilja.bv/yet-another-memory-leak-in-imagemagick-or-how-to-exploit-cve-2018-16323-a60f048a1e12", "creation_timestamp": "2018-11-19T16:07:26.000000Z"}, {"uuid": "62874c55-51e5-4a03-a401-59d861a573df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-16323", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/2043", "content": "Yet another memory leak in ImageMagick or how to exploit CVE-2018\u201316323.\nhttps://medium.com/@ilja.bv/yet-another-memory-leak-in-imagemagick-or-how-to-exploit-cve-2018-16323-a60f048a1e12", "creation_timestamp": "2018-11-19T17:12:18.000000Z"}, {"uuid": "03af4c35-7c88-4991-9f89-1e3f766d9c85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-16323", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/2044", "content": "CVE-2018-16323 is a memory leakage in processing XBM images. After XBM image was converted to another image type you can extract leaked memory bytes from image data.\nhttps://github.com/ttffdd/XBadManners", "creation_timestamp": "2018-11-19T17:14:43.000000Z"}]}