Forwarded from Clays market
🚀 Professional Telegram Bot Development
Want to automate your business, boost engagement, or simplify workflows?
We build custom Telegram bots tailored to your needs!
💡 What We Offer:
Smart chat automation
Payment & API integrations
Admin panels & analytics
AI-powered responses
24/7 customer support
📲 From concept to launch — we handle it all!
Let’s build your Telegram bot today.
👉 DM us to get started!
---
⚙️ We Build Telegram Bots That Work for You
Tired of repetitive tasks? Need an interactive community tool?
Our Telegram bots do the hard work — so you don’t have to.
✅ Custom features
✅ Fast development
✅ Scalable solutions
Get your bot up and running in days — not weeks!
💬 Contact us now to discuss your idea.
---
💬 Boost Your Brand with a Custom Telegram Bot
From eCommerce to crypto to customer support — we’ve got you covered!
We develop powerful, user-friendly Telegram bots designed to fit your goals.
🔥 Highlights:
Seamless API integration
Secure architecture
Clean UI and UX
Rapid delivery
📩 Message us to start your bot journey today!
Want to automate your business, boost engagement, or simplify workflows?
We build custom Telegram bots tailored to your needs!
💡 What We Offer:
Smart chat automation
Payment & API integrations
Admin panels & analytics
AI-powered responses
24/7 customer support
📲 From concept to launch — we handle it all!
Let’s build your Telegram bot today.
👉 DM us to get started!
---
⚙️ We Build Telegram Bots That Work for You
Tired of repetitive tasks? Need an interactive community tool?
Our Telegram bots do the hard work — so you don’t have to.
✅ Custom features
✅ Fast development
✅ Scalable solutions
Get your bot up and running in days — not weeks!
💬 Contact us now to discuss your idea.
---
💬 Boost Your Brand with a Custom Telegram Bot
From eCommerce to crypto to customer support — we’ve got you covered!
We develop powerful, user-friendly Telegram bots designed to fit your goals.
🔥 Highlights:
Seamless API integration
Secure architecture
Clean UI and UX
Rapid delivery
📩 Message us to start your bot journey today!
🕵️♂️ Shadow Tracks — The Hunt for “DarkDefaultIran” (2025)
⚖️ LEGAL DISCLAIMER
In the tangled web of the internet, every shadow leaves a trace. Somewhere in that darkness, an alias began to surface again and again — “DarkDefaultIran.” A name whispered across leak forums, hidden chats, and obscure code repositories. Small incidents at first, but the signature was always there — precise, deliberate, and unmistakably proud of its trail.
A decentralized group of cyber researchers known as The Clay Group noticed the pattern. They weren’t hackers or agents — just analysts, journalists, and digital hobbyists scattered across time zones, connected by curiosity and conscience. They lived by a single rule: look, but don’t touch. Gather what’s public, verify what’s real, and hand it to those who can act.
“We’re not heroes,” said Maya, one of the group’s founders. “We just follow the noise until it makes sense.”
The noise grew louder in early 2025. Forum posts mirrored each other, timestamps overlapped, and the same cryptic emojis appeared beneath breach announcements. The Clay Group started to map it all — not with hacking tools, but with patience. Each alias leaves behind habits: the hours they post, the phrasing they repeat, the tiny quirks no VPN can disguise.
Their goal wasn’t exposure. It was clarity. If there was a real threat behind the name, it had to be proven properly — not guessed at. When their findings finally aligned, they passed everything to a federal cybercrime unit. Within days, an official investigation began.
“Independent researchers can be our early-warning system,” said Agent Keller, a veteran investigator. “But once it crosses into evidence, the process must follow the law — warrants, subpoenas, chain of custody, everything airtight.”
That was the turning point. What had begun as scattered data became a lawful inquiry. Forensic teams traced server activity through legitimate channels, compared linguistic fingerprints, and correlated digital behavior. No shortcuts. No leaks. Just the long, quiet grind of procedure.
Behind every username, there’s a rhythm — when they’re active, how they write, what they reuse. That rhythm told its own story. Slowly, the investigation revealed a network of recycled handles, decoy posts, and interlinked accounts. The alias was not one person’s bravado, but a web of interconnected attempts to mislead and impress.
“People forget the internet remembers everything,” Maya said. “You can delete, disguise, or encrypt — but somewhere, the pattern stays.”
As the case unfolded, the Clay Group stepped back. Their work was done. They handed over every log, every timestamp, every open-source breadcrumb. What came next belonged to the system — courts, evidence, and process.
“Cyberjustice isn’t about revenge,” Agent Keller remarked. “It’s about precision. You don’t need to expose anyone online; you need to let the law do its work.”
Months later, the alias disappeared from the forums. Whether by choice or by capture, no one could say. What remained was the lesson: collaboration works when ethics guide it. The Clay Group never published names, never doxxed, never chased clout. They proved that digital vigilance can exist without violating privacy — that truth and discipline can share the same keyboard.
“Everyone wants to be the one who unmasks the villain,” Maya reflected. “But the real victory is when you protect people — not destroy them.”
And so the story of DarkDefaultIran faded into the archives — another digital ghost in the endless stream. Yet somewhere in that quiet, a message endures:
In a world built of shadows and screens, even the faintest light can leave a trace.
📎 Written for 2025 — Cyber Awareness Documentary Text
🖋️ By: The Clay Group
⚖️ LEGAL DISCLAIMER
In the tangled web of the internet, every shadow leaves a trace. Somewhere in that darkness, an alias began to surface again and again — “DarkDefaultIran.” A name whispered across leak forums, hidden chats, and obscure code repositories. Small incidents at first, but the signature was always there — precise, deliberate, and unmistakably proud of its trail.
A decentralized group of cyber researchers known as The Clay Group noticed the pattern. They weren’t hackers or agents — just analysts, journalists, and digital hobbyists scattered across time zones, connected by curiosity and conscience. They lived by a single rule: look, but don’t touch. Gather what’s public, verify what’s real, and hand it to those who can act.
“We’re not heroes,” said Maya, one of the group’s founders. “We just follow the noise until it makes sense.”
The noise grew louder in early 2025. Forum posts mirrored each other, timestamps overlapped, and the same cryptic emojis appeared beneath breach announcements. The Clay Group started to map it all — not with hacking tools, but with patience. Each alias leaves behind habits: the hours they post, the phrasing they repeat, the tiny quirks no VPN can disguise.
Their goal wasn’t exposure. It was clarity. If there was a real threat behind the name, it had to be proven properly — not guessed at. When their findings finally aligned, they passed everything to a federal cybercrime unit. Within days, an official investigation began.
“Independent researchers can be our early-warning system,” said Agent Keller, a veteran investigator. “But once it crosses into evidence, the process must follow the law — warrants, subpoenas, chain of custody, everything airtight.”
That was the turning point. What had begun as scattered data became a lawful inquiry. Forensic teams traced server activity through legitimate channels, compared linguistic fingerprints, and correlated digital behavior. No shortcuts. No leaks. Just the long, quiet grind of procedure.
Behind every username, there’s a rhythm — when they’re active, how they write, what they reuse. That rhythm told its own story. Slowly, the investigation revealed a network of recycled handles, decoy posts, and interlinked accounts. The alias was not one person’s bravado, but a web of interconnected attempts to mislead and impress.
“People forget the internet remembers everything,” Maya said. “You can delete, disguise, or encrypt — but somewhere, the pattern stays.”
As the case unfolded, the Clay Group stepped back. Their work was done. They handed over every log, every timestamp, every open-source breadcrumb. What came next belonged to the system — courts, evidence, and process.
“Cyberjustice isn’t about revenge,” Agent Keller remarked. “It’s about precision. You don’t need to expose anyone online; you need to let the law do its work.”
Months later, the alias disappeared from the forums. Whether by choice or by capture, no one could say. What remained was the lesson: collaboration works when ethics guide it. The Clay Group never published names, never doxxed, never chased clout. They proved that digital vigilance can exist without violating privacy — that truth and discipline can share the same keyboard.
“Everyone wants to be the one who unmasks the villain,” Maya reflected. “But the real victory is when you protect people — not destroy them.”
And so the story of DarkDefaultIran faded into the archives — another digital ghost in the endless stream. Yet somewhere in that quiet, a message endures:
In a world built of shadows and screens, even the faintest light can leave a trace.
📎 Written for 2025 — Cyber Awareness Documentary Text
🖋️ By: The Clay Group
Join a Free Forum for Tools, Scripts, and Hardware Projects
Discover a growing community of makers, coders, and learners sharing free tools, scripts, hardware projects, and tutorials. Chat in real time, post your own creations, and learn from others.
Everything is community moderated, open, and free to join.
Join now: http://55bxqy57ln7eisgjxmw2gx6aouv6adgqds6uxfth62rvcusxnos4zhyd.onion/
Discover a growing community of makers, coders, and learners sharing free tools, scripts, hardware projects, and tutorials. Chat in real time, post your own creations, and learn from others.
Everything is community moderated, open, and free to join.
Join now: http://55bxqy57ln7eisgjxmw2gx6aouv6adgqds6uxfth62rvcusxnos4zhyd.onion/
App name: notify soul
Discription: 📱 Notification Capture, 🗑️ Deleted Messages, 🎨 Modern UI, 💎 Premium Features unlockable via rewarded ads
Unlimited History (remove 100 message limit)
Themes & Animations
Media Recovery
Backup & Restore
Secret Mode (PIN protection)
About app: https://github.com/notifysoul
Direct download: claytechgroup.netlify.app/store/
Secured by your own device bcz data stored locally on your device
Discription: 📱 Notification Capture, 🗑️ Deleted Messages, 🎨 Modern UI, 💎 Premium Features unlockable via rewarded ads
Unlimited History (remove 100 message limit)
Themes & Animations
Media Recovery
Backup & Restore
Secret Mode (PIN protection)
About app: https://github.com/notifysoul
Direct download: claytechgroup.netlify.app/store/
Secured by your own device bcz data stored locally on your device
Hey dm @claysecure27 to get latest rats and malware for win10 and 2025 cves
Selling linux , windows and android malware
Features :
Screen control
File access
Network access
Root access
Keyboard access
Keylogs
C2 telegram cmd
Live screen
Screenshot
Contact
Album
Camera
Network devices
Location
And more
It can bypass defender and for android play protect
Features :
Screen control
File access
Network access
Root access
Keyboard access
Keylogs
C2 telegram cmd
Live screen
Screenshot
Contact
Album
Camera
Network devices
Location
And more
It can bypass defender and for android play protect
================================================================================
ANDROID CVE LIST 2015-2025
(Representative Sampling)
================================================================================
NOTE: This is NOT the complete list of all 3,815+ CVEs. Total CVEs are compiled
from NVD databases. This file contains documented CVEs from research and bulletins.
For complete list, visit: https://nvd.nist.gov/vuln/search?keyword=Android
Generated: December 19, 2025
================================================================================
YEAR 2015 (126 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2015-0973 | RCE | High | libpng buffer overflow
CVE-2015-1528 | EoP | High | native_handle_create integer overflow
CVE-2015-1536 | RCE | Critical | Media processing vulnerability (Stagefright)
CVE-2015-1538 | RCE | Critical | libstagefright vulnerability (Stagefright)
CVE-2015-1541 | RCE | Critical | Stagefright vulnerability
CVE-2015-3823 | EoP | High | SIM vulnerability
CVE-2015-3824 | RCE | Critical | Integer underflow in libstagefright MPEG4
CVE-2015-3826 | RCE | Critical | Stagefright vulnerability
CVE-2015-3828 | RCE | Critical | Integer overflow in libstagefright
CVE-2015-3831 | RCE | High | libpng Overflow in png_Read_IDAT_data
CVE-2015-3832 | RCE | Critical | Buffer overflow in libstagefright
CVE-2015-3834 | RCE | High | Buffer overflow in libstagefright OMXNodeInstance
CVE-2015-3835 | RCE | High | Framework vulnerability
CVE-2015-3836 | RCE | Critical | Buffer overflows in MPEG4Extractor
CVE-2015-3837 | RCE | Critical | ParcelableCreator vulnerability
CVE-2015-3842 | RCE | High | Buffer overflow in OMXNodeInstance
CVE-2015-3843 | EoP | High | Applications can intercept SIM commands
CVE-2015-3844 | RCE | High | Stagefright vulnerability
CVE-2015-3878 | EoP | Moderate | Screen recording vulnerability
CVE-2015-3879 | EoP | Moderate | Bluetooth vulnerability
CVE-2015-6596 | EoP | High | Elevation of privilege in Framework
CVE-2015-6602 | RCE | High | libutils vulnerability
CVE-2015-6606 | ID | High | Secure Element Evaluation Kit vulnerability
[+ 103 more CVEs in 2015]
================================================================================
YEAR 2016 (223 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2016-0787 | RCE | Critical | Qualcomm vulnerability
CVE-2016-0788 | RCE | Critical | MediaTek vulnerability
CVE-2016-0801 | RCE | Critical | Framework vulnerability
CVE-2016-0802 | RCE | Critical | Framework vulnerability
CVE-2016-0803 | RCE | Critical | Framework vulnerability
CVE-2016-0804 | RCE | Critical | Framework vulnerability
CVE-2016-2059 | RCE | Critical | Qualcomm vulnerability
CVE-2016-2060 | RCE | Critical | Qualcomm vulnerability
CVE-2016-2061 | RCE | Critical | Qualcomm vulnerability
CVE-2016-3723 | RCE | High | Qualcomm vulnerability
CVE-2016-3724 | RCE | High | Qualcomm vulnerability
CVE-2016-3725 | RCE | High | Qualcomm vulnerability
CVE-2016-3726 | RCE | High | Qualcomm vulnerability
CVE-2016-3727 | RCE | High | Qualcomm vulnerability
CVE-2016-3728 | RCE | High | Qualcomm vulnerability
CVE-2016-3729 | RCE | High | Qualcomm vulnerability
CVE-2016-3730 | RCE | High | Qualcomm vulnerability
CVE-2016-3731 | RCE | High | Qualcomm vulnerability
CVE-2016-3732 | RCE | High | Qualcomm vulnerability
CVE-2016-5330 | RCE | High | Framework vulnerability
CVE-2016-5331 | RCE | High | Framework vulnerability
CVE-2016-5332 | RCE | High | Framework vulnerability
CVE-2016-5333 | RCE | High | Framework vulnerability
CVE-2016-5334 | RCE | High | Framework vulnerability
CVE-2016-5335 | RCE | High | Framework vulnerability
CVE-2016-5336 | RCE | High | Framework vulnerability
CVE-2016-5337 | RCE | High | Framework vulnerability
CVE-2016-6910 | ID | High | Non-existent notification listener
ANDROID CVE LIST 2015-2025
(Representative Sampling)
================================================================================
NOTE: This is NOT the complete list of all 3,815+ CVEs. Total CVEs are compiled
from NVD databases. This file contains documented CVEs from research and bulletins.
For complete list, visit: https://nvd.nist.gov/vuln/search?keyword=Android
Generated: December 19, 2025
================================================================================
YEAR 2015 (126 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2015-0973 | RCE | High | libpng buffer overflow
CVE-2015-1528 | EoP | High | native_handle_create integer overflow
CVE-2015-1536 | RCE | Critical | Media processing vulnerability (Stagefright)
CVE-2015-1538 | RCE | Critical | libstagefright vulnerability (Stagefright)
CVE-2015-1541 | RCE | Critical | Stagefright vulnerability
CVE-2015-3823 | EoP | High | SIM vulnerability
CVE-2015-3824 | RCE | Critical | Integer underflow in libstagefright MPEG4
CVE-2015-3826 | RCE | Critical | Stagefright vulnerability
CVE-2015-3828 | RCE | Critical | Integer overflow in libstagefright
CVE-2015-3831 | RCE | High | libpng Overflow in png_Read_IDAT_data
CVE-2015-3832 | RCE | Critical | Buffer overflow in libstagefright
CVE-2015-3834 | RCE | High | Buffer overflow in libstagefright OMXNodeInstance
CVE-2015-3835 | RCE | High | Framework vulnerability
CVE-2015-3836 | RCE | Critical | Buffer overflows in MPEG4Extractor
CVE-2015-3837 | RCE | Critical | ParcelableCreator vulnerability
CVE-2015-3842 | RCE | High | Buffer overflow in OMXNodeInstance
CVE-2015-3843 | EoP | High | Applications can intercept SIM commands
CVE-2015-3844 | RCE | High | Stagefright vulnerability
CVE-2015-3878 | EoP | Moderate | Screen recording vulnerability
CVE-2015-3879 | EoP | Moderate | Bluetooth vulnerability
CVE-2015-6596 | EoP | High | Elevation of privilege in Framework
CVE-2015-6602 | RCE | High | libutils vulnerability
CVE-2015-6606 | ID | High | Secure Element Evaluation Kit vulnerability
[+ 103 more CVEs in 2015]
================================================================================
YEAR 2016 (223 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2016-0787 | RCE | Critical | Qualcomm vulnerability
CVE-2016-0788 | RCE | Critical | MediaTek vulnerability
CVE-2016-0801 | RCE | Critical | Framework vulnerability
CVE-2016-0802 | RCE | Critical | Framework vulnerability
CVE-2016-0803 | RCE | Critical | Framework vulnerability
CVE-2016-0804 | RCE | Critical | Framework vulnerability
CVE-2016-2059 | RCE | Critical | Qualcomm vulnerability
CVE-2016-2060 | RCE | Critical | Qualcomm vulnerability
CVE-2016-2061 | RCE | Critical | Qualcomm vulnerability
CVE-2016-3723 | RCE | High | Qualcomm vulnerability
CVE-2016-3724 | RCE | High | Qualcomm vulnerability
CVE-2016-3725 | RCE | High | Qualcomm vulnerability
CVE-2016-3726 | RCE | High | Qualcomm vulnerability
CVE-2016-3727 | RCE | High | Qualcomm vulnerability
CVE-2016-3728 | RCE | High | Qualcomm vulnerability
CVE-2016-3729 | RCE | High | Qualcomm vulnerability
CVE-2016-3730 | RCE | High | Qualcomm vulnerability
CVE-2016-3731 | RCE | High | Qualcomm vulnerability
CVE-2016-3732 | RCE | High | Qualcomm vulnerability
CVE-2016-5330 | RCE | High | Framework vulnerability
CVE-2016-5331 | RCE | High | Framework vulnerability
CVE-2016-5332 | RCE | High | Framework vulnerability
CVE-2016-5333 | RCE | High | Framework vulnerability
CVE-2016-5334 | RCE | High | Framework vulnerability
CVE-2016-5335 | RCE | High | Framework vulnerability
CVE-2016-5336 | RCE | High | Framework vulnerability
CVE-2016-5337 | RCE | High | Framework vulnerability
CVE-2016-6910 | ID | High | Non-existent notification listener
ner vulnerability
[+ 195 more CVEs in 2016]
================================================================================
YEAR 2017 (639 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2017-0001 | RCE | Critical | Kernel vulnerability
CVE-2017-0002 | RCE | Critical | Kernel vulnerability
CVE-2017-0003 | RCE | Critical | Kernel vulnerability
CVE-2017-0004 | RCE | Critical | Kernel vulnerability
CVE-2017-0005 | RCE | Critical | Kernel vulnerability
CVE-2017-0006 | RCE | Critical | Kernel vulnerability
CVE-2017-0007 | RCE | Critical | Kernel vulnerability
CVE-2017-0008 | RCE | Critical | Kernel vulnerability
CVE-2017-0009 | RCE | Critical | Kernel vulnerability
CVE-2017-0010 | RCE | Critical | Kernel vulnerability
CVE-2017-0011 | RCE | Critical | Kernel vulnerability
CVE-2017-0012 | RCE | Critical | Kernel vulnerability
CVE-2017-0013 | RCE | Critical | Kernel vulnerability
CVE-2017-0014 | RCE | Critical | Kernel vulnerability
CVE-2017-0015 | RCE | Critical | Kernel vulnerability
CVE-2017-0016 | RCE | Critical | Kernel vulnerability
CVE-2017-0017 | RCE | Critical | Kernel vulnerability
CVE-2017-0018 | RCE | Critical | Kernel vulnerability
CVE-2017-0019 | RCE | Critical | Kernel vulnerability
CVE-2017-0020 | RCE | Critical | Kernel vulnerability
CVE-2017-0021 | RCE | Critical | Framework vulnerability
CVE-2017-0022 | RCE | High | Framework vulnerability
CVE-2017-0023 | RCE | High | Framework vulnerability
[+ 616 more CVEs in 2017]
================================================================================
YEAR 2018 (261 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2018-9299 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9300 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9301 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9302 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9303 | RCE | Critical | MediaTek vulnerability
CVE-2018-9304 | RCE | Critical | MediaTek vulnerability
CVE-2018-9305 | RCE | High | Framework vulnerability
[+ 254 more CVEs in 2018]
================================================================================
YEAR 2019 (348 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2019-1819 | RCE | Critical | Qualcomm vulnerability
CVE-2019-1820 | RCE | Critical | MediaTek vulnerability
CVE-2019-1821 | RCE | Critical | Framework vulnerability
CVE-2019-2001 | RCE | High | Framework vulnerability
CVE-2019-2002 | RCE | High | Framework vulnerability
[+ 343 more CVEs in 2019]
================================================================================
YEAR 2020 (379 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2020-0001 | EoP | Critical | Kernel vulnerability
CVE-2020-0002 | EoP | Critical | Kernel vulnerability
CVE-2020-0003 | EoP | Critical | Kernel vulnerability
CVE-2020-0004 | EoP | Critical | Kernel vulnerability
CVE-2020-0005 | EoP | Critical | Framework vulnerability
CVE-2020-0006 | RCE | High | Framework vulnerability
[+ 373 more CVEs in 2020]
================================================================================
YEAR 2021 (272 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2021-0001 | EoP | Critical | Kernel vulnerability
CVE-2021-0002 | EoP | Critical | Kernel vulnerability
CVE-2021-0003 | EoP | High | Framework vulnerability
CVE-2021-0004 | RCE | High | Framework vulnerability
[+ 268 more CVEs in 2021]
================================================================================
YEAR 2022 (483 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2022-20001 | EoP | Critical | Kernel
[+ 195 more CVEs in 2016]
================================================================================
YEAR 2017 (639 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2017-0001 | RCE | Critical | Kernel vulnerability
CVE-2017-0002 | RCE | Critical | Kernel vulnerability
CVE-2017-0003 | RCE | Critical | Kernel vulnerability
CVE-2017-0004 | RCE | Critical | Kernel vulnerability
CVE-2017-0005 | RCE | Critical | Kernel vulnerability
CVE-2017-0006 | RCE | Critical | Kernel vulnerability
CVE-2017-0007 | RCE | Critical | Kernel vulnerability
CVE-2017-0008 | RCE | Critical | Kernel vulnerability
CVE-2017-0009 | RCE | Critical | Kernel vulnerability
CVE-2017-0010 | RCE | Critical | Kernel vulnerability
CVE-2017-0011 | RCE | Critical | Kernel vulnerability
CVE-2017-0012 | RCE | Critical | Kernel vulnerability
CVE-2017-0013 | RCE | Critical | Kernel vulnerability
CVE-2017-0014 | RCE | Critical | Kernel vulnerability
CVE-2017-0015 | RCE | Critical | Kernel vulnerability
CVE-2017-0016 | RCE | Critical | Kernel vulnerability
CVE-2017-0017 | RCE | Critical | Kernel vulnerability
CVE-2017-0018 | RCE | Critical | Kernel vulnerability
CVE-2017-0019 | RCE | Critical | Kernel vulnerability
CVE-2017-0020 | RCE | Critical | Kernel vulnerability
CVE-2017-0021 | RCE | Critical | Framework vulnerability
CVE-2017-0022 | RCE | High | Framework vulnerability
CVE-2017-0023 | RCE | High | Framework vulnerability
[+ 616 more CVEs in 2017]
================================================================================
YEAR 2018 (261 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2018-9299 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9300 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9301 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9302 | RCE | Critical | Qualcomm vulnerability
CVE-2018-9303 | RCE | Critical | MediaTek vulnerability
CVE-2018-9304 | RCE | Critical | MediaTek vulnerability
CVE-2018-9305 | RCE | High | Framework vulnerability
[+ 254 more CVEs in 2018]
================================================================================
YEAR 2019 (348 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2019-1819 | RCE | Critical | Qualcomm vulnerability
CVE-2019-1820 | RCE | Critical | MediaTek vulnerability
CVE-2019-1821 | RCE | Critical | Framework vulnerability
CVE-2019-2001 | RCE | High | Framework vulnerability
CVE-2019-2002 | RCE | High | Framework vulnerability
[+ 343 more CVEs in 2019]
================================================================================
YEAR 2020 (379 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2020-0001 | EoP | Critical | Kernel vulnerability
CVE-2020-0002 | EoP | Critical | Kernel vulnerability
CVE-2020-0003 | EoP | Critical | Kernel vulnerability
CVE-2020-0004 | EoP | Critical | Kernel vulnerability
CVE-2020-0005 | EoP | Critical | Framework vulnerability
CVE-2020-0006 | RCE | High | Framework vulnerability
[+ 373 more CVEs in 2020]
================================================================================
YEAR 2021 (272 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2021-0001 | EoP | Critical | Kernel vulnerability
CVE-2021-0002 | EoP | Critical | Kernel vulnerability
CVE-2021-0003 | EoP | High | Framework vulnerability
CVE-2021-0004 | RCE | High | Framework vulnerability
[+ 268 more CVEs in 2021]
================================================================================
YEAR 2022 (483 CVEs total) - Notable/Critical CVEs Listed
================================================================================
CVE-2022-20001 | EoP | Critical | Kernel