<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 17:50:10 +0000</lastBuildDate>
    <item>
      <title>963c8c4d-d1ab-48ce-8818-869c688c8c71</title>
      <link>https://vulnerability.circl.lu/sighting/963c8c4d-d1ab-48ce-8818-869c688c8c71/export</link>
      <description>{"uuid": "963c8c4d-d1ab-48ce-8818-869c688c8c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14759", "type": "seen", "source": "https://t.me/cibsecurity/14653", "content": "ATENTION\u203c New - CVE-2019-14759\n\nAn issue was discovered in KaiOS 1.0, 2.5, and 2.5.1. The pre-installed Radio application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Radio application. At a bare minimum, this allows an attacker to take control over the Radio application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-15T00:55:34.000000Z"}</description>
      <content:encoded>{"uuid": "963c8c4d-d1ab-48ce-8818-869c688c8c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14759", "type": "seen", "source": "https://t.me/cibsecurity/14653", "content": "ATENTION\u203c New - CVE-2019-14759\n\nAn issue was discovered in KaiOS 1.0, 2.5, and 2.5.1. The pre-installed Radio application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Radio application. At a bare minimum, this allows an attacker to take control over the Radio application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-15T00:55:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/963c8c4d-d1ab-48ce-8818-869c688c8c71/export</guid>
      <pubDate>Tue, 15 Sep 2020 00:55:34 +0000</pubDate>
    </item>
  </channel>
</rss>
