{"uuid": "7214c9e0-83bc-4613-b6cb-a0a71007c816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-15982", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/130", "content": "#exploit\n1. CVE-2018-15982:\nAdobe Flash Zero-Day Exploited in the Wild\nhttps://atr-blog.gigamon.com/2018/12/05/adobe-flash-zero-day-exploited-in-the-wild\n\n2. CVE-2018-8619:\nWindows - VBScript execution policy bypass via MSXML\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=1669\n\n3. WebKit RegEx Exploit:\niOS 12.0 - 12.1.1 as well as macOS 10.14.0 - 10.14.2\nhttps://github.com/LinusHenze/WebKit-RegEx-Exploit", "creation_timestamp": "2023-04-16T12:26:20.000000Z"}