{"vulnerability": "CVE-2018-18500", "sightings": [{"uuid": "249987c5-cf69-4dab-a576-2b814f788b3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4512", "content": "\u041f\u043e\u044f\u0432\u0438\u043b\u0441\u044f PoC \u0434\u043b\u044f use after free \u043f\u043e\u0434 FireFox (CVE-2018-18500). \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u0432 \u043d\u0435\u043c \u0442\u043e, \u0447\u0442\u043e \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0437\u0430\u0434\u0435\u0440\u0436\u043a\u0443 \u043f\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043e\u0442\u0432\u0435\u0442\u0430 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430. \n\nhttps://github.com/sophoslabs/CVE-2018-18500/", "creation_timestamp": "2019-04-18T07:20:59.000000Z"}, {"uuid": "25726aa9-6aad-4003-8258-84f93f12bf81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4755", "content": "CVE-2018-18500: write-after-free vulnerability in Firefox, Analysis and Exploitation\nhttps://news.sophos.com/en-us/2019/04/18/protected-cve-2018-18500-heap-write-after-free-in-firefox-analysis-and-exploitation/", "creation_timestamp": "2019-05-05T07:16:49.000000Z"}, {"uuid": "f9b1c672-b7af-4eda-8d21-eb61990e2653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/br0wsec/86", "content": "\u041f\u043e\u044f\u0432\u0438\u043b\u0441\u044f PoC \u0434\u043b\u044f use after free \u043f\u043e\u0434 FireFox (CVE-2018-18500). \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u0432 \u043d\u0435\u043c \u0442\u043e, \u0447\u0442\u043e \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0437\u0430\u0434\u0435\u0440\u0436\u043a\u0443 \u043f\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043e\u0442\u0432\u0435\u0442\u0430 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430. \n\nhttps://github.com/sophoslabs/CVE-2018-18500/", "creation_timestamp": "2019-04-18T07:17:58.000000Z"}, {"uuid": "987a9b3f-d1f4-4974-89c9-a20f9e322dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1055", "content": "PoC for CVE-2018-18500 - Firefox Use-After-Free\n\nhttps://github.com/sophoslabs/CVE-2018-18500/\n\n#re #expdev #browser #uaf #poc #darw1n", "creation_timestamp": "2019-04-26T10:28:47.000000Z"}, {"uuid": "f9b34c21-4bd0-4277-a3ef-639da1cb7ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/5478", "content": "CVE-2018-18500: write-after-free vulnerability in Firefox, Analysis and Exploitation\nhttps://news.sophos.com/en-us/2019/04/18/protected-cve-2018-18500-heap-write-after-free-in-firefox-analysis-and-exploitation/", "creation_timestamp": "2019-05-05T02:19:40.000000Z"}, {"uuid": "a1ef0d72-e6db-41ca-b1f2-7a3f2c620aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-18500", "type": "published-proof-of-concept", "source": "https://t.me/DC8044_Info/188", "content": "Firefox, CVE-2018-18500 A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. \n+ POC exploit.\nhttps://github.com/sophoslabs/CVE-2018-18500/", "creation_timestamp": "2019-04-18T11:38:13.000000Z"}]}