{"vulnerability": "cve-2017-13311", "sightings": [{"uuid": "07bffc0c-6ed6-41f0-9c51-b849ceeaad28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13311", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489167507386471", "content": "", "creation_timestamp": "2024-11-15T21:47:48.304842Z"}, {"uuid": "a9ea5b6d-e00b-4613-90cc-31796ae61259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13311", "type": "seen", "source": "https://t.me/cvedetector/11195", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2017-13311 - \"Google ProcessStats RCE\"\", \n  \"Content\": \"CVE ID : CVE-2017-13311 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:10:02.000000Z"}]}