<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T07:39:06.919345+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/59a2ce90-f24c-4c93-903a-171f00ed39d1/export</id>
    <title>59a2ce90-f24c-4c93-903a-171f00ed39d1</title>
    <updated>2026-05-06T07:39:07.186490+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "59a2ce90-f24c-4c93-903a-171f00ed39d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20009", "type": "seen", "source": "https://t.me/ctinow/178994", "content": "https://ift.tt/tphLg9K\nCVE-2024-20009", "creation_timestamp": "2024-02-05T07:26:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/59a2ce90-f24c-4c93-903a-171f00ed39d1/export"/>
    <published>2024-02-05T07:26:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8fc93e4-2076-4898-aab7-a35f5cf1a309/export</id>
    <title>f8fc93e4-2076-4898-aab7-a35f5cf1a309</title>
    <updated>2026-05-06T07:39:07.186424+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8fc93e4-2076-4898-aab7-a35f5cf1a309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20003", "type": "seen", "source": "https://t.me/ctinow/192948", "content": "https://ift.tt/i9vFfK6\nCVE-2024-20003 | MediaTek MT8797 NR RRC Connection Setup Message denial of service (MOLY01191612)", "creation_timestamp": "2024-02-25T17:46:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8fc93e4-2076-4898-aab7-a35f5cf1a309/export"/>
    <published>2024-02-25T17:46:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63d066a7-9c93-4e31-82a5-0db7c44d8486/export</id>
    <title>63d066a7-9c93-4e31-82a5-0db7c44d8486</title>
    <updated>2026-05-06T07:39:07.186357+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63d066a7-9c93-4e31-82a5-0db7c44d8486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20004", "type": "seen", "source": "https://t.me/ctinow/192949", "content": "https://ift.tt/8Qr5zRV\nCVE-2024-20004 | MediaTek MT8797 NR RRC Connection Setup Message denial of service (MOLY01191612)", "creation_timestamp": "2024-02-25T17:46:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63d066a7-9c93-4e31-82a5-0db7c44d8486/export"/>
    <published>2024-02-25T17:46:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abfbb6fc-6745-4e33-be5a-f0092b63736b/export</id>
    <title>abfbb6fc-6745-4e33-be5a-f0092b63736b</title>
    <updated>2026-05-06T07:39:07.186285+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abfbb6fc-6745-4e33-be5a-f0092b63736b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20007", "type": "seen", "source": "https://t.me/ctinow/192950", "content": "https://ift.tt/Nsgw7fX\nCVE-2024-20007 | MediaTek MT8798 mp3 Decoder out-of-bounds write (ALPS08441369)", "creation_timestamp": "2024-02-25T17:46:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abfbb6fc-6745-4e33-be5a-f0092b63736b/export"/>
    <published>2024-02-25T17:46:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6628f7e7-dc99-4df7-9640-440751b312cf/export</id>
    <title>6628f7e7-dc99-4df7-9640-440751b312cf</title>
    <updated>2026-05-06T07:39:07.186214+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6628f7e7-dc99-4df7-9640-440751b312cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20009", "type": "seen", "source": "https://t.me/ctinow/192964", "content": "https://ift.tt/VfAC7rS\nCVE-2024-20009 | MediaTek MT6580 alac Decoder out-of-bounds write (ALPS08441150)", "creation_timestamp": "2024-02-25T18:21:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6628f7e7-dc99-4df7-9640-440751b312cf/export"/>
    <published>2024-02-25T18:21:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7adbc60-2563-4572-aeb4-0531109b2ceb/export</id>
    <title>c7adbc60-2563-4572-aeb4-0531109b2ceb</title>
    <updated>2026-05-06T07:39:07.186143+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7adbc60-2563-4572-aeb4-0531109b2ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20001", "type": "seen", "source": "https://t.me/ctinow/192966", "content": "https://ift.tt/kVjqdtL\nCVE-2024-20001 | MediaTek MT9689 TVAPI out-of-bounds write (DTV03961601)", "creation_timestamp": "2024-02-25T18:21:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7adbc60-2563-4572-aeb4-0531109b2ceb/export"/>
    <published>2024-02-25T18:21:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/819c6899-6109-4b0c-9413-83e77762608f/export</id>
    <title>819c6899-6109-4b0c-9413-83e77762608f</title>
    <updated>2026-05-06T07:39:07.186068+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "819c6899-6109-4b0c-9413-83e77762608f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20002", "type": "seen", "source": "https://t.me/ctinow/192967", "content": "https://ift.tt/IpiUPxe\nCVE-2024-20002 | MediaTek MT9689 TVAPI out-of-bounds write (DTV03961715)", "creation_timestamp": "2024-02-25T18:21:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/819c6899-6109-4b0c-9413-83e77762608f/export"/>
    <published>2024-02-25T18:21:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6e59c73f-34bc-45d4-9901-98b41d70513a/export</id>
    <title>6e59c73f-34bc-45d4-9901-98b41d70513a</title>
    <updated>2026-05-06T07:39:07.185989+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6e59c73f-34bc-45d4-9901-98b41d70513a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20006", "type": "seen", "source": "https://t.me/ctinow/192973", "content": "https://ift.tt/UDCReVP\nCVE-2024-20006 | MediaTek MT2713/MT6781/MT6880/MT6890/MT8188T out-of-bounds write (ALPS08477148)", "creation_timestamp": "2024-02-25T18:51:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6e59c73f-34bc-45d4-9901-98b41d70513a/export"/>
    <published>2024-02-25T18:51:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38313eb8-cdd9-413d-8850-c545d7538059/export</id>
    <title>38313eb8-cdd9-413d-8850-c545d7538059</title>
    <updated>2026-05-06T07:39:07.185879+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38313eb8-cdd9-413d-8850-c545d7538059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20005", "type": "seen", "source": "https://t.me/ctinow/198975", "content": "https://ift.tt/a3uN2Bs\nCVE-2024-20005", "creation_timestamp": "2024-03-04T04:31:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38313eb8-cdd9-413d-8850-c545d7538059/export"/>
    <published>2024-03-04T04:31:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d55a98b7-76db-4979-80f0-02e0281d6328/export</id>
    <title>d55a98b7-76db-4979-80f0-02e0281d6328</title>
    <updated>2026-05-06T07:39:07.183968+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d55a98b7-76db-4979-80f0-02e0281d6328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20002", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18582", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20002\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.\n\ud83d\udccf Published: 2024-02-05T05:59:42.613Z\n\ud83d\udccf Modified: 2025-06-17T13:34:19.277Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/February-2024", "creation_timestamp": "2025-06-17T13:39:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d55a98b7-76db-4979-80f0-02e0281d6328/export"/>
    <published>2025-06-17T13:39:33+00:00</published>
  </entry>
</feed>
