{"vulnerability": "CVE-2018-4301", "sightings": [{"uuid": "c3018ce8-e647-4944-a5f6-04f3272be144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113794227524162381", "content": "", "creation_timestamp": "2025-01-08T18:48:35.186411Z"}, {"uuid": "e16cfc2e-9d98-41c6-8bcc-27c16822d1d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113789670850933219", "content": "", "creation_timestamp": "2025-01-07T23:29:45.446776Z"}, {"uuid": "2ce22fd7-2f16-47b4-8b87-4f735e70d064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf6v3r3ace2m", "content": "", "creation_timestamp": "2025-01-08T00:15:48.970804Z"}, {"uuid": "2ff5dec7-9ace-4a86-970c-e3d7c9630037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113789905529282996", "content": "", "creation_timestamp": "2025-01-08T00:29:26.523306Z"}, {"uuid": "8b9cbd47-86db-4343-a59b-18517dd4e149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6wmo5tnv2w", "content": "", "creation_timestamp": "2025-01-08T00:43:09.716575Z"}, {"uuid": "7cfc1d66-34de-43ed-b8ea-4d146da51f2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://t.me/cvedetector/14612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-4301 - Gemalto Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2018-4301 \nPublished : Jan. 8, 2025, 12:15 a.m. | 16\u00a0minutes ago \nDescription : This issue is fixed in SCSSU-201801. A potential stack based buffer overflow existed in GemaltoKeyHandle.cpp. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T01:35:47.000000Z"}, {"uuid": "6f7d6f56-988d-4dbb-95b3-3d9b55477a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-4301", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/598", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-4301\n\ud83d\udd39 Description: This issue is fixed in SCSSU-201801. A potential stack based buffer overflow existed in GemaltoKeyHandle.cpp.\n\ud83d\udccf Published: 2025-01-07T23:26:58.979Z\n\ud83d\udccf Modified: 2025-01-07T23:26:58.979Z\n\ud83d\udd17 References:\n1. https://smartcardservices.github.io/security/", "creation_timestamp": "2025-01-07T23:37:20.000000Z"}]}