{"vulnerability": "CVE-2018-1202", "sightings": [{"uuid": "79e061fb-07fd-43bd-80e9-d5c3836d58ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-1202", "type": "exploited", "source": "https://www.exploit-db.com/exploits/44039", "content": "", "creation_timestamp": "2018-02-14T00:00:00.000000Z"}, {"uuid": "aff37d54-9659-4d88-964c-21c89d868531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12020", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/3958", "content": "SigSpoof: Spoofing signatures in GnuPG, Enigmail, GPGTools and python-gnupg (CVE-2018-12020)\nhttps://neopg.io/blog/gpg-signature-spoof/", "creation_timestamp": "2018-06-14T15:37:23.000000Z"}, {"uuid": "2287eb6b-4b64-4433-ae7b-d871b1391b6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12023", "type": "seen", "source": "https://t.me/cibsecurity/3268", "content": "ATENTION\u203c New - CVE-2018-12023\n\nAn issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-03-21T19:26:47.000000Z"}, {"uuid": "4d35443f-21df-42ee-8bab-4aa279ce67d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12022", "type": "seen", "source": "https://t.me/cibsecurity/3269", "content": "ATENTION\u203c New - CVE-2018-12022\n\nAn issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-03-21T19:26:48.000000Z"}, {"uuid": "156ac557-95bf-49a1-95ad-0a52dba88458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12022", "type": "seen", "source": "https://gist.github.com/might-might/40e680f1f9ce10e8b91c6629d1f0fec9", "content": "", "creation_timestamp": "2025-12-13T20:32:11.000000Z"}, {"uuid": "abf06a6a-553a-4be2-9526-0afd2adb92d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-12022", "type": "seen", "source": "https://gist.github.com/might-might/7893a493252338fe360077f6f10e55e2", "content": "", "creation_timestamp": "2025-12-13T20:32:46.000000Z"}]}