{"uuid": "79f8b6c8-78fd-4db9-b2cf-d4d4cdff4065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-9439", "type": "seen", "source": "https://t.me/cvedetector/12046", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2018-9439 - In __unregister_prot_hook and packet_release of af\", \n  \"Content\": \"CVE ID : CVE-2018-9439 \nPublished : Dec. 5, 2024, 12:15 a.m. | 38\u00a0minutes ago \nDescription : In __unregister_prot_hook and packet_release of af_packet.c, there is a  \n    possible use-after-free due to improper locking. This could lead to local  \n    escalation of privilege in the kernel with System execution privileges  \n    needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T01:58:08.000000Z"}