<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 16:28:49 +0000</lastBuildDate>
    <item>
      <title>67a043e9-efe5-4067-a6b2-0c765ef5b50c</title>
      <link>https://vulnerability.circl.lu/sighting/67a043e9-efe5-4067-a6b2-0c765ef5b50c/export</link>
      <description>{"uuid": "67a043e9-efe5-4067-a6b2-0c765ef5b50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39791", "type": "seen", "source": "https://t.me/cibsecurity/39846", "content": "\u203c CVE-2021-39791 \u203c\n\nIn WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T20:18:28.000000Z"}</description>
      <content:encoded>{"uuid": "67a043e9-efe5-4067-a6b2-0c765ef5b50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-39791", "type": "seen", "source": "https://t.me/cibsecurity/39846", "content": "\u203c CVE-2021-39791 \u203c\n\nIn WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T20:18:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/67a043e9-efe5-4067-a6b2-0c765ef5b50c/export</guid>
      <pubDate>Wed, 30 Mar 2022 20:18:28 +0000</pubDate>
    </item>
  </channel>
</rss>
