{"vulnerability": "cve-2018-9475", "sightings": [{"uuid": "b50aafa4-dc65-4e94-a5e0-3354cd4f0560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9475", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113516486644426409", "content": "", "creation_timestamp": "2024-11-20T17:35:25.326695Z"}, {"uuid": "b372bd27-c437-411c-8a0b-62055c760f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9475", "type": "seen", "source": "https://t.me/cvedetector/11647", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-9475 - BlueZ Bluetooth Heap-based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2018-9475 \nPublished : Nov. 20, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T19:36:24.000000Z"}]}