{"vulnerability": "cve-2023-33760", "sightings": [{"uuid": "f1bbaf7d-0013-4868-affe-308c9712c5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33760", "type": "seen", "source": "https://t.me/ctinow/173339", "content": "https://ift.tt/6GXHlV3\nCVE-2023-33760", "creation_timestamp": "2024-01-25T09:26:30.000000Z"}, {"uuid": "c7ad459c-0825-497c-8112-881406bebb0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33760", "type": "seen", "source": "https://t.me/arpsyndicate/3032", "content": "#ExploitObserverAlert\n\nCVE-2023-33760\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33760. SpliceCom Maximiser Soft PBX v1.5 and before was discovered to utilize a default SSL certificate. This issue can allow attackers to eavesdrop on communications via a man-in-the-middle attack.", "creation_timestamp": "2024-01-26T18:20:43.000000Z"}, {"uuid": "aaf8dd8d-f9d6-4e83-9c93-018e6171fa54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33760", "type": "seen", "source": "https://t.me/ctinow/187237", "content": "https://ift.tt/RWwhHVC\nCVE-2023-33760 | SpliceCom Maximiser Soft PBX up to 1.5 SSL Certificate channel accessible", "creation_timestamp": "2024-02-18T13:06:41.000000Z"}, {"uuid": "2537e80e-21c0-428d-a152-c8a07e8dc295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33760", "type": "seen", "source": "https://t.me/ctinow/177262", "content": "https://ift.tt/j2AcO1Y\nCVE-2023-33760 Exploit", "creation_timestamp": "2024-02-01T02:17:01.000000Z"}]}