{"vulnerability": "cve-2017-13312", "sightings": [{"uuid": "e91d5334-05ac-43a0-a974-a30f35b0d232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13312", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489198214765768", "content": "", "creation_timestamp": "2024-11-15T21:55:37.028634Z"}, {"uuid": "25b05c36-8f05-467f-9115-a84694578fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13312", "type": "seen", "source": "https://t.me/cvedetector/11196", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2017-13312 - Cisco MediaCas Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2017-13312 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : In createFromParcel of MediaCas.java, there is a possible parcel read/write mismatch due to improper input validation. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:10:03.000000Z"}]}