{"vulnerability": "cve-2021-29627", "sightings": [{"uuid": "594445cf-3ac2-4c50-a7f4-be161d610759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-29627", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3112", "content": "#exploit\nCVE-2021-29627:\nIn FreeBSD 13.0-STABLE &lt; n245050, 12.2-STABLE &lt; r369525, 13.0-RC4 &lt; p0, 12.2-RELEASE &lt; p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free/use after free (1-day PoC)\nhttps://github.com/raymontag/cve-2021-29627", "creation_timestamp": "2021-04-14T11:46:33.000000Z"}]}