<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:59:30 +0000</lastBuildDate>
    <item>
      <title>2a4bb0cd-1f87-4089-af88-840667f24d28</title>
      <link>https://vulnerability.circl.lu/sighting/2a4bb0cd-1f87-4089-af88-840667f24d28/export</link>
      <description>{"uuid": "2a4bb0cd-1f87-4089-af88-840667f24d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22955", "type": "seen", "source": "https://t.me/cibsecurity/68384", "content": "\u203c CVE-2023-22955 \u203c\n\nAn issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. The validation of firmware images only consists of simple checksum checks for different firmware components. Thus, by knowing how to calculate and where to store the required checksums for the flasher tool, an attacker is able to store malicious firmware.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-12T00:16:52.000000Z"}</description>
      <content:encoded>{"uuid": "2a4bb0cd-1f87-4089-af88-840667f24d28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22955", "type": "seen", "source": "https://t.me/cibsecurity/68384", "content": "\u203c CVE-2023-22955 \u203c\n\nAn issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. The validation of firmware images only consists of simple checksum checks for different firmware components. Thus, by knowing how to calculate and where to store the required checksums for the flasher tool, an attacker is able to store malicious firmware.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-12T00:16:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a4bb0cd-1f87-4089-af88-840667f24d28/export</guid>
      <pubDate>Sat, 12 Aug 2023 00:16:52 +0000</pubDate>
    </item>
  </channel>
</rss>
