{"vulnerability": "CVE-2021-0966", "sightings": [{"uuid": "54b0a6fe-431b-4aed-b26b-dc5e1f00a9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-0966", "type": "seen", "source": "https://t.me/cibsecurity/34063", "content": "\u203c CVE-2021-0966 \u203c\n\nIn code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-15T22:35:22.000000Z"}]}