{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreic73yallcry5a6hhtvs4s4e7gx3lezfxqw34slewjueqbqdksdg7i",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mlofle72jfa2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibet4iyybrk7lfbz5xhkgtyb2bpdhm2p43b6o472kqmzlpxipga3i"
},
"mimeType": "image/jpeg",
"size": 136679
},
"path": "/2026/05/new-exim-bdat-vulnerability-exposes.html",
"publishedAt": "2026-05-12T16:44:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution.\nExim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email.\nThe vulnerability, tracked as CVE-2026-45185, aka Dead.Letter, has been described as a use-after-free",
"title": "New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution"
}