{"vulnerability": "cve-2017-13227", "sightings": [{"uuid": "b5d1b8f3-8fc7-4938-9cbf-fbe29a882830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13227", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113483615009401105", "content": "", "creation_timestamp": "2024-11-14T22:15:44.034826Z"}, {"uuid": "9b363b6e-ee50-470c-9456-4588ce83c987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13227", "type": "seen", "source": "https://t.me/cvedetector/11027", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2017-13227 - Google Autofill Package Name Insecure Trust Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2017-13227 \nPublished : Nov. 14, 2024, 11:15 p.m. | 38\u00a0minutes ago \nDescription : In the autofill service, the package name that is provided by the app process is trusted inappropriately. \u00a0This could lead to information disclosure with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T01:01:55.000000Z"}]}