<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 10:57:04 +0000</lastBuildDate>
    <item>
      <title>2c6d9d80-b8e0-45a7-9c99-cef01afbead1</title>
      <link>https://db.gcve.eu/sighting/2c6d9d80-b8e0-45a7-9c99-cef01afbead1/export</link>
      <description>{"uuid": "2c6d9d80-b8e0-45a7-9c99-cef01afbead1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199929", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:22:21.000000Z"}</description>
      <content:encoded>{"uuid": "2c6d9d80-b8e0-45a7-9c99-cef01afbead1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199929", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:22:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c6d9d80-b8e0-45a7-9c99-cef01afbead1/export</guid>
      <pubDate>Tue, 05 Mar 2024 06:22:21 +0000</pubDate>
    </item>
    <item>
      <title>98802346-08a4-4818-ae2a-a0ca6f506f20</title>
      <link>https://db.gcve.eu/sighting/98802346-08a4-4818-ae2a-a0ca6f506f20/export</link>
      <description>{"uuid": "98802346-08a4-4818-ae2a-a0ca6f506f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199942", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:27:05.000000Z"}</description>
      <content:encoded>{"uuid": "98802346-08a4-4818-ae2a-a0ca6f506f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "https://t.me/ctinow/199942", "content": "https://ift.tt/DQeCRSu\nCVE-2024-20832", "creation_timestamp": "2024-03-05T06:27:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/98802346-08a4-4818-ae2a-a0ca6f506f20/export</guid>
      <pubDate>Tue, 05 Mar 2024 06:27:05 +0000</pubDate>
    </item>
    <item>
      <title>f8648cf4-52f8-4728-afc8-74d33d3ca809</title>
      <link>https://db.gcve.eu/sighting/f8648cf4-52f8-4728-afc8-74d33d3ca809/export</link>
      <description>{"uuid": "f8648cf4-52f8-4728-afc8-74d33d3ca809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11294", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-16T19:03:36.000000Z"}</description>
      <content:encoded>{"uuid": "f8648cf4-52f8-4728-afc8-74d33d3ca809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11294", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-16T19:03:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f8648cf4-52f8-4728-afc8-74d33d3ca809/export</guid>
      <pubDate>Wed, 16 Oct 2024 19:03:36 +0000</pubDate>
    </item>
    <item>
      <title>2588d87c-988c-4d4b-a74c-b6bba4199d72</title>
      <link>https://db.gcve.eu/sighting/2588d87c-988c-4d4b-a74c-b6bba4199d72/export</link>
      <description>{"uuid": "2588d87c-988c-4d4b-a74c-b6bba4199d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3666", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-19T19:27:30.000000Z"}</description>
      <content:encoded>{"uuid": "2588d87c-988c-4d4b-a74c-b6bba4199d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3666", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&amp;gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-19T19:27:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2588d87c-988c-4d4b-a74c-b6bba4199d72/export</guid>
      <pubDate>Sat, 19 Oct 2024 19:27:30 +0000</pubDate>
    </item>
    <item>
      <title>1d5b3db7-c6a3-4984-96aa-13d96da95ddb</title>
      <link>https://db.gcve.eu/sighting/1d5b3db7-c6a3-4984-96aa-13d96da95ddb/export</link>
      <description>{"uuid": "1d5b3db7-c6a3-4984-96aa-13d96da95ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2304", "content": "Heap overflow in JPEG loading in Samsung's Little Kernel in bootloader allows a privileged attacker to execute persistent arbitrary code (it survives reboots and factory reset) CVE-2024-20832  \nPaper: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf\nSlides: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Slides-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf", "creation_timestamp": "2025-02-11T10:25:10.000000Z"}</description>
      <content:encoded>{"uuid": "1d5b3db7-c6a3-4984-96aa-13d96da95ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2304", "content": "Heap overflow in JPEG loading in Samsung's Little Kernel in bootloader allows a privileged attacker to execute persistent arbitrary code (it survives reboots and factory reset) CVE-2024-20832  \nPaper: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Article-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf\nSlides: https://www.sstic.org/media/SSTIC2024/SSTIC-actes/when_vendor1_meets_vendor2_the_story_of_a_small_bu/SSTIC2024-Slides-when_vendor1_meets_vendor2_the_story_of_a_small_bug_chain-rossi-bellom_neveu.pdf", "creation_timestamp": "2025-02-11T10:25:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d5b3db7-c6a3-4984-96aa-13d96da95ddb/export</guid>
      <pubDate>Tue, 11 Feb 2025 10:25:10 +0000</pubDate>
    </item>
    <item>
      <title>2bdef7aa-698e-4ed2-beca-1e7838119182</title>
      <link>https://db.gcve.eu/sighting/2bdef7aa-698e-4ed2-beca-1e7838119182/export</link>
      <description>{"uuid": "2bdef7aa-698e-4ed2-beca-1e7838119182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "Telegram/DtJ76WTJbFXep5qblnoRp6oEJqsKkpsj6GwR1b44B4dheMKQ", "content": "", "creation_timestamp": "2025-02-14T10:01:37.000000Z"}</description>
      <content:encoded>{"uuid": "2bdef7aa-698e-4ed2-beca-1e7838119182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20832", "type": "seen", "source": "Telegram/DtJ76WTJbFXep5qblnoRp6oEJqsKkpsj6GwR1b44B4dheMKQ", "content": "", "creation_timestamp": "2025-02-14T10:01:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2bdef7aa-698e-4ed2-beca-1e7838119182/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:01:37 +0000</pubDate>
    </item>
  </channel>
</rss>
