<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T08:45:45.806107+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/25c58cdb-30af-45e5-89e6-b7e63fc46ecf/export</id>
    <title>25c58cdb-30af-45e5-89e6-b7e63fc46ecf</title>
    <updated>2026-05-11T08:45:46.106649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "25c58cdb-30af-45e5-89e6-b7e63fc46ecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "exploited", "source": "https://t.me/xakep_ru/16585", "content": "Google \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043e 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 Samsung\n\n\u0410\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 Google Threat Analysis Group (TAG) \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445 Samsung. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438, \u0447\u0442\u043e \u0431\u0430\u0433 \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\nhttps://xakep.ru/2024/10/23/cve-2024-44068/", "creation_timestamp": "2024-10-23T10:34:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/25c58cdb-30af-45e5-89e6-b7e63fc46ecf/export"/>
    <published>2024-10-23T10:34:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87623a2d-111a-4805-b8e1-b637903b642c/export</id>
    <title>87623a2d-111a-4805-b8e1-b637903b642c</title>
    <updated>2026-05-11T08:45:46.106568+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87623a2d-111a-4805-b8e1-b637903b642c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "seen", "source": "https://t.me/CyberBulletin/1233", "content": "\u26a1\ufe0fResearcher Details 0-Day Flaw CVE-2024-44068 in Samsung Exynos Processors.\n\n#CyberBulletin", "creation_timestamp": "2024-10-23T11:57:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87623a2d-111a-4805-b8e1-b637903b642c/export"/>
    <published>2024-10-23T11:57:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d173df70-8be3-4ef8-a3bd-32027ce8d021/export</id>
    <title>d173df70-8be3-4ef8-a3bd-32027ce8d021</title>
    <updated>2026-05-11T08:45:46.106481+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d173df70-8be3-4ef8-a3bd-32027ce8d021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "seen", "source": "https://t.me/CyberBulletin/26168", "content": "\u26a1\ufe0fResearcher Details 0-Day Flaw CVE-2024-44068 in Samsung Exynos Processors.\n\n#CyberBulletin", "creation_timestamp": "2024-10-23T11:57:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d173df70-8be3-4ef8-a3bd-32027ce8d021/export"/>
    <published>2024-10-23T11:57:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/539976ec-699a-4289-9e3f-f03adbdfe4c3/export</id>
    <title>539976ec-699a-4289-9e3f-f03adbdfe4c3</title>
    <updated>2026-05-11T08:45:46.106375+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "539976ec-699a-4289-9e3f-f03adbdfe4c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "seen", "source": "https://t.me/InfoSecInsider/24161", "content": "\u26a1\ufe0fResearcher Details 0-Day Flaw CVE-2024-44068 in Samsung Exynos Processors.\n\n#CyberBulletin", "creation_timestamp": "2024-10-23T11:59:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/539976ec-699a-4289-9e3f-f03adbdfe4c3/export"/>
    <published>2024-10-23T11:59:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/813ef606-c780-4bb3-b379-ed3045737906/export</id>
    <title>813ef606-c780-4bb3-b379-ed3045737906</title>
    <updated>2026-05-11T08:45:46.106277+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "813ef606-c780-4bb3-b379-ed3045737906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "seen", "source": "https://t.me/InfoSecInsider/548", "content": "\u26a1\ufe0fResearcher Details 0-Day Flaw CVE-2024-44068 in Samsung Exynos Processors.\n\n#CyberBulletin", "creation_timestamp": "2024-10-23T11:59:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/813ef606-c780-4bb3-b379-ed3045737906/export"/>
    <published>2024-10-23T11:59:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34a32339-1d57-4843-8700-0ff6444c9b94/export</id>
    <title>34a32339-1d57-4843-8700-0ff6444c9b94</title>
    <updated>2026-05-11T08:45:46.106175+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34a32339-1d57-4843-8700-0ff6444c9b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "exploited", "source": "https://t.me/CyberBulletin/26183", "content": "\u26a1\ufe0fA nasty bug in Samsung's mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google security researchers.\n\nThe use-after-free vulnerability is tracked as CVE-2024-44068, and it affects Samsung Exynos mobile processors versions 9820, 9825, 980, 990, 850, and W920. It received an 8.1 out of 10 CVSS severity rating, and Samsung, in its very brief security advisory, describes it as a high-severity flaw. The vendor patched the hole on October 7.\n\n#CyberBulletin", "creation_timestamp": "2024-10-24T07:50:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34a32339-1d57-4843-8700-0ff6444c9b94/export"/>
    <published>2024-10-24T07:50:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e46487ae-4d83-41a6-924c-242634d9c4aa/export</id>
    <title>e46487ae-4d83-41a6-924c-242634d9c4aa</title>
    <updated>2026-05-11T08:45:46.106077+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e46487ae-4d83-41a6-924c-242634d9c4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "exploited", "source": "https://t.me/CyberBulletin/1248", "content": "\u26a1\ufe0fA nasty bug in Samsung's mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google security researchers.\n\nThe use-after-free vulnerability is tracked as CVE-2024-44068, and it affects Samsung Exynos mobile processors versions 9820, 9825, 980, 990, 850, and W920. It received an 8.1 out of 10 CVSS severity rating, and Samsung, in its very brief security advisory, describes it as a high-severity flaw. The vendor patched the hole on October 7.\n\n#CyberBulletin", "creation_timestamp": "2024-10-24T07:50:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e46487ae-4d83-41a6-924c-242634d9c4aa/export"/>
    <published>2024-10-24T07:50:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c2d3f03-712a-42d7-b76e-f013f40840bd/export</id>
    <title>5c2d3f03-712a-42d7-b76e-f013f40840bd</title>
    <updated>2026-05-11T08:45:46.105985+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c2d3f03-712a-42d7-b76e-f013f40840bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "exploited", "source": "https://t.me/Rootsec_2/5253", "content": "#Mobile_Security\nSamsung Exynos m2m1shot_scaler0 device driver page UaF in Android (CVE-2024-44068)\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2024/CVE-2024-44068.html", "creation_timestamp": "2024-11-26T05:28:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c2d3f03-712a-42d7-b76e-f013f40840bd/export"/>
    <published>2024-11-26T05:28:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34241c8c-c509-4fa5-8b06-3c6920923330/export</id>
    <title>34241c8c-c509-4fa5-8b06-3c6920923330</title>
    <updated>2026-05-11T08:45:46.105781+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34241c8c-c509-4fa5-8b06-3c6920923330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11484", "content": "#Mobile_Security\nSamsung Exynos m2m1shot_scaler0 device driver page UaF in Android (CVE-2024-44068)\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2024/CVE-2024-44068.html", "creation_timestamp": "2024-11-26T11:07:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34241c8c-c509-4fa5-8b06-3c6920923330/export"/>
    <published>2024-11-26T11:07:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/444d3c90-aaff-45b1-a987-83cecb4b91a6/export</id>
    <title>444d3c90-aaff-45b1-a987-83cecb4b91a6</title>
    <updated>2026-05-11T08:45:46.101901+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "444d3c90-aaff-45b1-a987-83cecb4b91a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44068", "type": "exploited", "source": "https://t.me/DEVIL_La_RSx/1803", "content": "#Mobile_Security\nSamsung Exynos m2m1shot_scaler0 device driver page UaF in Android (CVE-2024-44068)\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2024/CVE-2024-44068.html", "creation_timestamp": "2024-12-02T02:36:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/444d3c90-aaff-45b1-a987-83cecb4b91a6/export"/>
    <published>2024-12-02T02:36:32+00:00</published>
  </entry>
</feed>
