{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic73yallcry5a6hhtvs4s4e7gx3lezfxqw34slewjueqbqdksdg7i",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mlofle72jfa2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibet4iyybrk7lfbz5xhkgtyb2bpdhm2p43b6o472kqmzlpxipga3i"
    },
    "mimeType": "image/jpeg",
    "size": 136679
  },
  "path": "/2026/05/new-exim-bdat-vulnerability-exposes.html",
  "publishedAt": "2026-05-12T16:44:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution.\nExim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive, route, and deliver email.\nThe vulnerability, tracked as CVE-2026-45185, aka Dead.Letter, has been described as a use-after-free",
  "title": "New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution"
}