<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 16:40:13 +0000</lastBuildDate>
    <item>
      <title>2bc0e565-5e48-465d-8cb8-9b94376ea296</title>
      <link>https://db.gcve.eu/sighting/2bc0e565-5e48-465d-8cb8-9b94376ea296/export</link>
      <description>{"uuid": "2bc0e565-5e48-465d-8cb8-9b94376ea296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "seen", "source": "https://t.me/SecLabNews/7361", "content": "\u0412 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0430\u0445 OnePlus 7 Pro \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-7958), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0438 \u043f\u0430\u043b\u044c\u0446\u0435\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u0425\u043e\u0442\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u043e\u043d\u0430 \u043f\u0440\u043e\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u0432\u0435\u0442 \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443.    \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 OnePlus 7 Pro \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0438 \u043f\u0430\u043b\u044c\u0446\u0435\u0432", "creation_timestamp": "2020-04-15T14:10:01.000000Z"}</description>
      <content:encoded>{"uuid": "2bc0e565-5e48-465d-8cb8-9b94376ea296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "seen", "source": "https://t.me/SecLabNews/7361", "content": "\u0412 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0430\u0445 OnePlus 7 Pro \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-7958), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0438 \u043f\u0430\u043b\u044c\u0446\u0435\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u0425\u043e\u0442\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u043e\u043d\u0430 \u043f\u0440\u043e\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u0432\u0435\u0442 \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443.    \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 OnePlus 7 Pro \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0438 \u043f\u0430\u043b\u044c\u0446\u0435\u0432", "creation_timestamp": "2020-04-15T14:10:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2bc0e565-5e48-465d-8cb8-9b94376ea296/export</guid>
      <pubDate>Wed, 15 Apr 2020 14:10:01 +0000</pubDate>
    </item>
    <item>
      <title>b9880dc1-7f9e-4d12-89c1-6c807a1719d3</title>
      <link>https://db.gcve.eu/sighting/b9880dc1-7f9e-4d12-89c1-6c807a1719d3/export</link>
      <description>{"uuid": "b9880dc1-7f9e-4d12-89c1-6c807a1719d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "seen", "source": "https://t.me/androidMalware/770", "content": "Vulnerability Advisory: CVE-2020-7958 biometric data disclosure vulnerability in OnePlus 7 Pro Android phone\nhttps://www.synopsys.com/blogs/software-security/cve-2020-7958/", "creation_timestamp": "2020-04-18T16:03:41.000000Z"}</description>
      <content:encoded>{"uuid": "b9880dc1-7f9e-4d12-89c1-6c807a1719d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "seen", "source": "https://t.me/androidMalware/770", "content": "Vulnerability Advisory: CVE-2020-7958 biometric data disclosure vulnerability in OnePlus 7 Pro Android phone\nhttps://www.synopsys.com/blogs/software-security/cve-2020-7958/", "creation_timestamp": "2020-04-18T16:03:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b9880dc1-7f9e-4d12-89c1-6c807a1719d3/export</guid>
      <pubDate>Sat, 18 Apr 2020 16:03:41 +0000</pubDate>
    </item>
    <item>
      <title>231925de-9e17-4afc-97eb-1d7ee98b1c5d</title>
      <link>https://db.gcve.eu/sighting/231925de-9e17-4afc-97eb-1d7ee98b1c5d/export</link>
      <description>{"uuid": "231925de-9e17-4afc-97eb-1d7ee98b1c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1533", "content": "CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack/ #exploit #android #dukeBarman", "creation_timestamp": "2020-04-30T06:40:31.000000Z"}</description>
      <content:encoded>{"uuid": "231925de-9e17-4afc-97eb-1d7ee98b1c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1533", "content": "CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack/ #exploit #android #dukeBarman", "creation_timestamp": "2020-04-30T06:40:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/231925de-9e17-4afc-97eb-1d7ee98b1c5d/export</guid>
      <pubDate>Thu, 30 Apr 2020 06:40:31 +0000</pubDate>
    </item>
    <item>
      <title>2b63d4e8-8897-4237-8865-6e653c0f4f2d</title>
      <link>https://db.gcve.eu/sighting/2b63d4e8-8897-4237-8865-6e653c0f4f2d/export</link>
      <description>{"uuid": "2b63d4e8-8897-4237-8865-6e653c0f4f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/558", "content": "CyRC analysis: CVE-2020-7958 on Android Trusted Execution Environment\n\n\u201cWe dig into the inner workings of trustlets, how different components work together to provide a Trusted Execution Environment, and how to attack them.[\u2026]\u201d https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack/ https://www.synopsys.com/blogs/software-security/cve-2020-7958/...\n\nContinue reading at Firmware  Security", "creation_timestamp": "2020-05-04T18:58:22.000000Z"}</description>
      <content:encoded>{"uuid": "2b63d4e8-8897-4237-8865-6e653c0f4f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7958", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/558", "content": "CyRC analysis: CVE-2020-7958 on Android Trusted Execution Environment\n\n\u201cWe dig into the inner workings of trustlets, how different components work together to provide a Trusted Execution Environment, and how to attack them.[\u2026]\u201d https://www.synopsys.com/blogs/software-security/cve-2020-7958-trustlet-tee-attack/ https://www.synopsys.com/blogs/software-security/cve-2020-7958/...\n\nContinue reading at Firmware  Security", "creation_timestamp": "2020-05-04T18:58:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2b63d4e8-8897-4237-8865-6e653c0f4f2d/export</guid>
      <pubDate>Mon, 04 May 2020 18:58:22 +0000</pubDate>
    </item>
  </channel>
</rss>
