<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T23:06:09.060890+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5114efc8-1c01-4240-a1b8-a92cd2277f02/export</id>
    <title>5114efc8-1c01-4240-a1b8-a92cd2277f02</title>
    <updated>2026-05-08T23:06:09.430537+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5114efc8-1c01-4240-a1b8-a92cd2277f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48518", "type": "seen", "source": "https://t.me/cibsecurity/66064", "content": "\u203c CVE-2022-48518 \u203c\n\nVulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T16:25:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5114efc8-1c01-4240-a1b8-a92cd2277f02/export"/>
    <published>2023-07-06T16:25:42+00:00</published>
  </entry>
</feed>
