{"vulnerability": "CVE-2018-9401", "sightings": [{"uuid": "ea35391a-2dd6-4cad-81f8-d4e6877ba396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113846269768652312", "content": "", "creation_timestamp": "2025-01-17T23:23:36.605154Z"}, {"uuid": "f30ef8d4-9547-4792-8d36-df17c71173f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxzrcirhx2f", "content": "", "creation_timestamp": "2025-01-18T00:15:59.988984Z"}, {"uuid": "78914620-9bff-443a-808a-e10d6786d7ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfy3d5lpla2w", "content": "", "creation_timestamp": "2025-01-18T00:43:53.452369Z"}, {"uuid": "9d3988f9-2a2a-4072-996e-613429464234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-9401\n\ud83d\udd39 Description: In many locations, there is a possible way to access kernel memory in user space due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-17T23:17:04.245Z\n\ud83d\udccf Modified: 2025-01-17T23:17:04.245Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2018-06-01", "creation_timestamp": "2025-01-17T23:57:09.000000Z"}, {"uuid": "b21d51b5-4bae-4f9f-8403-b85473226f8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8467", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2018-9401\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In many locations, there is a possible way to access kernel memory in user space due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-17T23:17:04.245Z\n\ud83d\udccf Modified: 2025-03-24T16:14:47.452Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2018-06-01", "creation_timestamp": "2025-03-24T16:22:59.000000Z"}, {"uuid": "04fcdcea-b255-4671-9df4-55b0a88ba763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9401", "type": "seen", "source": "https://t.me/cvedetector/15773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-9401 - Citrix XenServer Privilege Escalationetration\", \n  \"Content\": \"CVE ID : CVE-2018-9401 \nPublished : Jan. 18, 2025, 12:15 a.m. | 37\u00a0minutes ago \nDescription : In many locations, there is a possible way to access kernel memory in user space due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T02:01:04.000000Z"}]}