<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:25:00.991469+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export</id>
    <title>f881fba4-f9e8-40e7-b50e-d3c34f45e66e</title>
    <updated>2026-05-04T09:25:01.279243+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f881fba4-f9e8-40e7-b50e-d3c34f45e66e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/arpsyndicate/3039", "content": "#ExploitObserverAlert\n\nCVE-2023-33757\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33757. A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.", "creation_timestamp": "2024-01-26T19:02:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export"/>
    <published>2024-01-26T19:02:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export</id>
    <title>d4cdc00a-0428-4279-8931-1024ac810cda</title>
    <updated>2026-05-04T09:25:01.279163+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4cdc00a-0428-4279-8931-1024ac810cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/177170", "content": "https://ift.tt/t6IaiMo\nCVE-2023-33757 Exploit", "creation_timestamp": "2024-01-31T23:16:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export"/>
    <published>2024-01-31T23:16:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e82e766-81f8-4bdb-804c-49c9038cd895/export</id>
    <title>1e82e766-81f8-4bdb-804c-49c9038cd895</title>
    <updated>2026-05-04T09:25:01.279085+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e82e766-81f8-4bdb-804c-49c9038cd895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/177171", "content": "https://ift.tt/rp3WGo0\nCVE-2023-33758 Exploit", "creation_timestamp": "2024-01-31T23:16:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e82e766-81f8-4bdb-804c-49c9038cd895/export"/>
    <published>2024-01-31T23:16:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4a01803-7f54-4b01-aa09-fb794210e9ab/export</id>
    <title>e4a01803-7f54-4b01-aa09-fb794210e9ab</title>
    <updated>2026-05-04T09:25:01.279007+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e4a01803-7f54-4b01-aa09-fb794210e9ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/177261", "content": "https://ift.tt/GWDEOvr\nCVE-2023-33759 Exploit", "creation_timestamp": "2024-02-01T02:17:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4a01803-7f54-4b01-aa09-fb794210e9ab/export"/>
    <published>2024-02-01T02:17:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export</id>
    <title>0f8c74b1-5d9b-4ce6-859c-409f310255dd</title>
    <updated>2026-05-04T09:25:01.278926+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f8c74b1-5d9b-4ce6-859c-409f310255dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/187245", "content": "https://ift.tt/M7ofSUt\nCVE-2023-33757 | SpliceCom iPCS/iPCS2 certificate validation", "creation_timestamp": "2024-02-18T13:41:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export"/>
    <published>2024-02-18T13:41:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d1a20a39-a6fb-4299-8ac2-5158ea3af76e/export</id>
    <title>d1a20a39-a6fb-4299-8ac2-5158ea3af76e</title>
    <updated>2026-05-04T09:25:01.278842+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d1a20a39-a6fb-4299-8ac2-5158ea3af76e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/187246", "content": "https://ift.tt/pk0ge8C\nCVE-2023-33758 | SpliceCom Maximiser Soft PBX up to 1.5 Login CLIENT_NAME/DEVICE_GUID cross site scripting", "creation_timestamp": "2024-02-18T13:41:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d1a20a39-a6fb-4299-8ac2-5158ea3af76e/export"/>
    <published>2024-02-18T13:41:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d4ac28a-fa08-4618-9d01-b1438bac272a/export</id>
    <title>8d4ac28a-fa08-4618-9d01-b1438bac272a</title>
    <updated>2026-05-04T09:25:01.278760+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d4ac28a-fa08-4618-9d01-b1438bac272a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/187247", "content": "https://ift.tt/FmkJlG6\nCVE-2023-33759 | SpliceCom Maximiser Soft PBX up to 1.5 excessive authentication", "creation_timestamp": "2024-02-18T13:41:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d4ac28a-fa08-4618-9d01-b1438bac272a/export"/>
    <published>2024-02-18T13:41:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c80219e6-e8bd-44f3-afb9-660176f36c46/export</id>
    <title>c80219e6-e8bd-44f3-afb9-660176f36c46</title>
    <updated>2026-05-04T09:25:01.278667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c80219e6-e8bd-44f3-afb9-660176f36c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33758\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the CLIENT_NAME and DEVICE_GUID fields in the login component.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:35:13.162Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c80219e6-e8bd-44f3-afb9-660176f36c46/export"/>
    <published>2025-06-20T19:43:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export</id>
    <title>e5e592de-940c-4c4f-b21b-5c0278232a66</title>
    <updated>2026-05-04T09:25:01.278528+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5e592de-940c-4c4f-b21b-5c0278232a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33757\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:34:27.669Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export"/>
    <published>2025-06-20T19:43:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9a50009-57da-4888-9a3b-bff95abf03b1/export</id>
    <title>d9a50009-57da-4888-9a3b-bff95abf03b1</title>
    <updated>2026-05-04T09:25:01.276461+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9a50009-57da-4888-9a3b-bff95abf03b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3375", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ly7rpb3bgbr2", "content": "", "creation_timestamp": "2025-09-07T03:48:20.930514Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9a50009-57da-4888-9a3b-bff95abf03b1/export"/>
    <published>2025-09-07T03:48:20.930514+00:00</published>
  </entry>
</feed>
