{"vulnerability": "CVE-2020-28018", "sightings": [{"uuid": "f343bc77-368f-49dd-bd05-9a51df23cc5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "https://t.me/someSecurityNotes/78", "content": "#exploit #exim #guide\n\u2014\u2014\n\n\u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043f\u043e\u0438\u0441\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 exim (CVE-2020-28018).\n\u2014\u2014\n\nhttps://adepts.of0x.cc/exim-cve-2020-28018/", "creation_timestamp": "2021-05-20T02:41:34.000000Z"}, {"uuid": "61eaf6c2-ad47-42f9-a2db-8f357bb4ed8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "Telegram/RunQ6C-wdh1CdujsWSMBG_b9rRp9KM1dCcRlmkPgCQHIUw", "content": "", "creation_timestamp": "2021-05-16T13:08:28.000000Z"}, {"uuid": "860e7137-27fb-444b-8f91-4cd867f36e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3379", "content": "#Threat_Research\n1. From theory to practice: analysis and PoC development for CVE-2020-28018 (Use-After-Free in Exim)\nhttps://adepts.of0x.cc/exim-cve-2020-28018\n2. Stealing secrets with Rust Macros PoC via VSCode\nhttps://github.com/lucky/bad_actor_poc", "creation_timestamp": "2021-05-16T13:07:06.000000Z"}]}