{"vulnerability": "cve-2018-9390", "sightings": [{"uuid": "a173e3bf-da17-49d9-8d79-3284c0b8bb42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-9390", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113602586864752201", "content": "", "creation_timestamp": "2024-12-05T22:31:50.411889Z"}, {"uuid": "c49a5536-527d-40e2-bea9-2cc4d95b4e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-9390", "type": "seen", "source": "https://t.me/cvedetector/12160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-9390 - In procfile_write of gl_proc.c, there is a possibl\", \n  \"Content\": \"CVE ID : CVE-2018-9390 \nPublished : Dec. 5, 2024, 11:15 p.m. | 42\u00a0minutes ago \nDescription : In procfile_write of gl_proc.c, there is a possible out of  bounds read of a  \n    function pointer due to an incorrect bounds check. This could lead to local  \n    escalation of privilege with System execution privileges needed. User  \n    interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T01:24:10.000000Z"}]}