<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 23:06:08 +0000</lastBuildDate>
    <item>
      <title>5114efc8-1c01-4240-a1b8-a92cd2277f02</title>
      <link>https://vulnerability.circl.lu/sighting/5114efc8-1c01-4240-a1b8-a92cd2277f02/export</link>
      <description>{"uuid": "5114efc8-1c01-4240-a1b8-a92cd2277f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48518", "type": "seen", "source": "https://t.me/cibsecurity/66064", "content": "\u203c CVE-2022-48518 \u203c\n\nVulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T16:25:42.000000Z"}</description>
      <content:encoded>{"uuid": "5114efc8-1c01-4240-a1b8-a92cd2277f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48518", "type": "seen", "source": "https://t.me/cibsecurity/66064", "content": "\u203c CVE-2022-48518 \u203c\n\nVulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T16:25:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5114efc8-1c01-4240-a1b8-a92cd2277f02/export</guid>
      <pubDate>Thu, 06 Jul 2023 16:25:42 +0000</pubDate>
    </item>
  </channel>
</rss>
