<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 06:39:37 +0000</lastBuildDate>
    <item>
      <title>19f13dbc-e1a0-4b14-82af-16aa062774f5</title>
      <link>https://db.gcve.eu/sighting/19f13dbc-e1a0-4b14-82af-16aa062774f5/export</link>
      <description>{"uuid": "19f13dbc-e1a0-4b14-82af-16aa062774f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0388", "type": "seen", "source": "https://t.me/cibsecurity/24717", "content": "\u203c CVE-2021-0388 \u203c\n\nIn onReceive of ImsPhoneCallTracker.java, there is a possible misattribution of data usage due to an incorrect broadcast handler. This could lead to local escalation of privilege resulting in attributing video call data to the wrong app, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162741489\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-10T20:53:16.000000Z"}</description>
      <content:encoded>{"uuid": "19f13dbc-e1a0-4b14-82af-16aa062774f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-0388", "type": "seen", "source": "https://t.me/cibsecurity/24717", "content": "\u203c CVE-2021-0388 \u203c\n\nIn onReceive of ImsPhoneCallTracker.java, there is a possible misattribution of data usage due to an incorrect broadcast handler. This could lead to local escalation of privilege resulting in attributing video call data to the wrong app, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162741489\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-10T20:53:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/19f13dbc-e1a0-4b14-82af-16aa062774f5/export</guid>
      <pubDate>Wed, 10 Mar 2021 20:53:16 +0000</pubDate>
    </item>
  </channel>
</rss>
