<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T08:30:31.618891+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7730cf41-6799-4fdd-9304-31460bd0e610/export</id>
    <title>7730cf41-6799-4fdd-9304-31460bd0e610</title>
    <updated>2026-05-06T08:30:31.949757+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7730cf41-6799-4fdd-9304-31460bd0e610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/ctinow/159796", "content": "https://ift.tt/tTuf8bH\nCVE-2023-43955", "creation_timestamp": "2023-12-27T22:26:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7730cf41-6799-4fdd-9304-31460bd0e610/export"/>
    <published>2023-12-27T22:26:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/045b4a34-33b6-48ba-be54-7a021a2a3653/export</id>
    <title>045b4a34-33b6-48ba-be54-7a021a2a3653</title>
    <updated>2026-05-06T08:30:31.949676+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "045b4a34-33b6-48ba-be54-7a021a2a3653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/arpsyndicate/2271", "content": "#ExploitObserverAlert\n\nCVE-2023-43955\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43955. The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.", "creation_timestamp": "2023-12-31T01:57:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/045b4a34-33b6-48ba-be54-7a021a2a3653/export"/>
    <published>2023-12-31T01:57:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/91afda70-9ff2-4ec7-9f46-2cf2408ce685/export</id>
    <title>91afda70-9ff2-4ec7-9f46-2cf2408ce685</title>
    <updated>2026-05-06T08:30:31.949544+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "91afda70-9ff2-4ec7-9f46-2cf2408ce685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/ctinow/165422", "content": "https://ift.tt/JvCjen3\nCVE-2023-43955 Exploit", "creation_timestamp": "2024-01-09T23:17:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/91afda70-9ff2-4ec7-9f46-2cf2408ce685/export"/>
    <published>2024-01-09T23:17:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d8cdd5b-155c-4743-973e-ba74ad0f1370/export</id>
    <title>2d8cdd5b-155c-4743-973e-ba74ad0f1370</title>
    <updated>2026-05-06T08:30:31.947126+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2d8cdd5b-155c-4743-973e-ba74ad0f1370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43955", "type": "seen", "source": "https://t.me/arpsyndicate/2961", "content": "#ExploitObserverAlert\n\nCVE-2023-43955\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-43955. The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.\n\nFIRST-EPSS: 0.002610000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-20T14:03:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d8cdd5b-155c-4743-973e-ba74ad0f1370/export"/>
    <published>2024-01-20T14:03:19+00:00</published>
  </entry>
</feed>
