<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 20:55:40 +0000</lastBuildDate>
    <item>
      <title>1f65b390-0dc4-405d-acf2-d63a1f5f0bec</title>
      <link>https://db.gcve.eu/sighting/1f65b390-0dc4-405d-acf2-d63a1f5f0bec/export</link>
      <description>{"uuid": "1f65b390-0dc4-405d-acf2-d63a1f5f0bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38788", "type": "seen", "source": "https://t.me/cibsecurity/35872", "content": "\u203c CVE-2021-38788 \u203c\n\nThe Background service in Allwinner R818 SoC Android Q SDK V1.0 is used to manage background applications. Malicious apps can use the interface provided by the service to set the number of applications allowed to run in the background to 0 and add themselves to the whitelist, so that once other applications enter the background, they will be forcibly stopped by the system, causing a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-19T18:25:58.000000Z"}</description>
      <content:encoded>{"uuid": "1f65b390-0dc4-405d-acf2-d63a1f5f0bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-38788", "type": "seen", "source": "https://t.me/cibsecurity/35872", "content": "\u203c CVE-2021-38788 \u203c\n\nThe Background service in Allwinner R818 SoC Android Q SDK V1.0 is used to manage background applications. Malicious apps can use the interface provided by the service to set the number of applications allowed to run in the background to 0 and add themselves to the whitelist, so that once other applications enter the background, they will be forcibly stopped by the system, causing a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-19T18:25:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1f65b390-0dc4-405d-acf2-d63a1f5f0bec/export</guid>
      <pubDate>Wed, 19 Jan 2022 18:25:58 +0000</pubDate>
    </item>
  </channel>
</rss>
