<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T22:06:13.933111+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9b7084b-68e0-4ffa-b60a-8ed55fc302d3/export</id>
    <title>a9b7084b-68e0-4ffa-b60a-8ed55fc302d3</title>
    <updated>2026-05-10T22:06:14.304307+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9b7084b-68e0-4ffa-b60a-8ed55fc302d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20271", "type": "seen", "source": "https://t.me/cibsecurity/48030", "content": "\u203c CVE-2022-20271 \u203c\n\nIn PermissionController, there is a possible way to grant some permissions without user consent due to misleading or insufficient UI. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-207672635\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:33:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9b7084b-68e0-4ffa-b60a-8ed55fc302d3/export"/>
    <published>2022-08-12T18:33:31+00:00</published>
  </entry>
</feed>
