{"vulnerability": "CVE-2018-9426", "sightings": [{"uuid": "4989bffe-268e-44e7-aa57-092ef7f79607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9426", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113585368287875465", "content": "", "creation_timestamp": "2024-12-02T21:32:56.022511Z"}, {"uuid": "73e2811c-b0d9-416c-a23c-acfb907260de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9426", "type": "seen", "source": "https://t.me/cvedetector/11842", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-9426 - Oracle RSA Weak Key Generation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2018-9426 \nPublished : Dec. 2, 2024, 10:15 p.m. | 30\u00a0minutes ago \nDescription : In \u00a0RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java,\u00a0an incorrect implementation could cause weak RSA key pairs being generated.\u00a0This could lead to crypto vulnerability with no additional execution\u00a0privileges needed. User interaction is not needed for exploitation.\u00a0Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T23:46:57.000000Z"}]}