<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:20:57.984225+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1220edad-abec-493e-8ada-a50191d38df4/export</id>
    <title>1220edad-abec-493e-8ada-a50191d38df4</title>
    <updated>2026-05-04T14:20:58.324494+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1220edad-abec-493e-8ada-a50191d38df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/173336", "content": "https://ift.tt/Im2NCER\nCVE-2023-33757", "creation_timestamp": "2024-01-25T09:26:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1220edad-abec-493e-8ada-a50191d38df4/export"/>
    <published>2024-01-25T09:26:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export</id>
    <title>f881fba4-f9e8-40e7-b50e-d3c34f45e66e</title>
    <updated>2026-05-04T14:20:58.324378+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f881fba4-f9e8-40e7-b50e-d3c34f45e66e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/arpsyndicate/3039", "content": "#ExploitObserverAlert\n\nCVE-2023-33757\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33757. A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.", "creation_timestamp": "2024-01-26T19:02:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export"/>
    <published>2024-01-26T19:02:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export</id>
    <title>d4cdc00a-0428-4279-8931-1024ac810cda</title>
    <updated>2026-05-04T14:20:58.324253+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4cdc00a-0428-4279-8931-1024ac810cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/177170", "content": "https://ift.tt/t6IaiMo\nCVE-2023-33757 Exploit", "creation_timestamp": "2024-01-31T23:16:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export"/>
    <published>2024-01-31T23:16:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export</id>
    <title>0f8c74b1-5d9b-4ce6-859c-409f310255dd</title>
    <updated>2026-05-04T14:20:58.324088+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f8c74b1-5d9b-4ce6-859c-409f310255dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/187245", "content": "https://ift.tt/M7ofSUt\nCVE-2023-33757 | SpliceCom iPCS/iPCS2 certificate validation", "creation_timestamp": "2024-02-18T13:41:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export"/>
    <published>2024-02-18T13:41:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export</id>
    <title>e5e592de-940c-4c4f-b21b-5c0278232a66</title>
    <updated>2026-05-04T14:20:58.321927+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5e592de-940c-4c4f-b21b-5c0278232a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33757\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:34:27.669Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export"/>
    <published>2025-06-20T19:43:31+00:00</published>
  </entry>
</feed>
