<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T09:02:43.177469+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2c6d9d80-b8e0-45a7-9c99-cef01afbead1/export</id>
    <title>2c6d9d80-b8e0-45a7-9c99-cef01afbead1</title>
    <updated>2026-05-01T09:02:43.550192+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2c6d9d80-b8e0-45a7-9c99-cef01afbead1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199929", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:22:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2c6d9d80-b8e0-45a7-9c99-cef01afbead1/export"/>
    <published>2024-03-05T06:22:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/98802346-08a4-4818-ae2a-a0ca6f506f20/export</id>
    <title>98802346-08a4-4818-ae2a-a0ca6f506f20</title>
    <updated>2026-05-01T09:02:43.550118+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "98802346-08a4-4818-ae2a-a0ca6f506f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199942", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:27:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/98802346-08a4-4818-ae2a-a0ca6f506f20/export"/>
    <published>2024-03-05T06:27:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f8648cf4-52f8-4728-afc8-74d33d3ca809/export</id>
    <title>f8648cf4-52f8-4728-afc8-74d33d3ca809</title>
    <updated>2026-05-01T09:02:43.550064+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f8648cf4-52f8-4728-afc8-74d33d3ca809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11294", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-16T19:03:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f8648cf4-52f8-4728-afc8-74d33d3ca809/export"/>
    <published>2024-10-16T19:03:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2588d87c-988c-4d4b-a74c-b6bba4199d72/export</id>
    <title>2588d87c-988c-4d4b-a74c-b6bba4199d72</title>
    <updated>2026-05-01T09:02:43.550007+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2588d87c-988c-4d4b-a74c-b6bba4199d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3666", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-19T19:27:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2588d87c-988c-4d4b-a74c-b6bba4199d72/export"/>
    <published>2024-10-19T19:27:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d5b3db7-c6a3-4984-96aa-13d96da95ddb/export</id>
    <title>1d5b3db7-c6a3-4984-96aa-13d96da95ddb</title>
    <updated>2026-05-01T09:02:43.549928+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d5b3db7-c6a3-4984-96aa-13d96da95ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2304", "content": "Heap overflow in JPEG loading in Samsung's Little Kernel in bootloader allows a privileged attacker to execute persistent arbitrary code (it survives reboots and factory reset) CVE-2024-20832  \nPaper: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf\nSlides: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Slides-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf", "creation_timestamp": "2025-02-11T10:25:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d5b3db7-c6a3-4984-96aa-13d96da95ddb/export"/>
    <published>2025-02-11T10:25:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2bdef7aa-698e-4ed2-beca-1e7838119182/export</id>
    <title>2bdef7aa-698e-4ed2-beca-1e7838119182</title>
    <updated>2026-05-01T09:02:43.548822+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2bdef7aa-698e-4ed2-beca-1e7838119182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "Telegram/DtJ76WTJbFXep5qblnoRp6oEJqsKkpsj6GwR1b44B4dheMKQ", "content": "", "creation_timestamp": "2025-02-14T10:01:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2bdef7aa-698e-4ed2-beca-1e7838119182/export"/>
    <published>2025-02-14T10:01:37+00:00</published>
  </entry>
</feed>
