<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 20:51:03 +0000</lastBuildDate>
    <item>
      <title>f881fba4-f9e8-40e7-b50e-d3c34f45e66e</title>
      <link>https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export</link>
      <description>{"uuid": "f881fba4-f9e8-40e7-b50e-d3c34f45e66e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/arpsyndicate/3039", "content": "#ExploitObserverAlert\n\nCVE-2023-33757\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33757. A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.", "creation_timestamp": "2024-01-26T19:02:12.000000Z"}</description>
      <content:encoded>{"uuid": "f881fba4-f9e8-40e7-b50e-d3c34f45e66e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/arpsyndicate/3039", "content": "#ExploitObserverAlert\n\nCVE-2023-33757\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33757. A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.", "creation_timestamp": "2024-01-26T19:02:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f881fba4-f9e8-40e7-b50e-d3c34f45e66e/export</guid>
      <pubDate>Fri, 26 Jan 2024 19:02:12 +0000</pubDate>
    </item>
    <item>
      <title>d4cdc00a-0428-4279-8931-1024ac810cda</title>
      <link>https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export</link>
      <description>{"uuid": "d4cdc00a-0428-4279-8931-1024ac810cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/177170", "content": "https://ift.tt/t6IaiMo\nCVE-2023-33757 Exploit", "creation_timestamp": "2024-01-31T23:16:58.000000Z"}</description>
      <content:encoded>{"uuid": "d4cdc00a-0428-4279-8931-1024ac810cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/177170", "content": "https://ift.tt/t6IaiMo\nCVE-2023-33757 Exploit", "creation_timestamp": "2024-01-31T23:16:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d4cdc00a-0428-4279-8931-1024ac810cda/export</guid>
      <pubDate>Wed, 31 Jan 2024 23:16:58 +0000</pubDate>
    </item>
    <item>
      <title>1e82e766-81f8-4bdb-804c-49c9038cd895</title>
      <link>https://vulnerability.circl.lu/sighting/1e82e766-81f8-4bdb-804c-49c9038cd895/export</link>
      <description>{"uuid": "1e82e766-81f8-4bdb-804c-49c9038cd895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/177171", "content": "https://ift.tt/rp3WGo0\nCVE-2023-33758 Exploit", "creation_timestamp": "2024-01-31T23:16:59.000000Z"}</description>
      <content:encoded>{"uuid": "1e82e766-81f8-4bdb-804c-49c9038cd895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/177171", "content": "https://ift.tt/rp3WGo0\nCVE-2023-33758 Exploit", "creation_timestamp": "2024-01-31T23:16:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1e82e766-81f8-4bdb-804c-49c9038cd895/export</guid>
      <pubDate>Wed, 31 Jan 2024 23:16:59 +0000</pubDate>
    </item>
    <item>
      <title>e4a01803-7f54-4b01-aa09-fb794210e9ab</title>
      <link>https://vulnerability.circl.lu/sighting/e4a01803-7f54-4b01-aa09-fb794210e9ab/export</link>
      <description>{"uuid": "e4a01803-7f54-4b01-aa09-fb794210e9ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/177261", "content": "https://ift.tt/GWDEOvr\nCVE-2023-33759 Exploit", "creation_timestamp": "2024-02-01T02:17:00.000000Z"}</description>
      <content:encoded>{"uuid": "e4a01803-7f54-4b01-aa09-fb794210e9ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/177261", "content": "https://ift.tt/GWDEOvr\nCVE-2023-33759 Exploit", "creation_timestamp": "2024-02-01T02:17:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e4a01803-7f54-4b01-aa09-fb794210e9ab/export</guid>
      <pubDate>Thu, 01 Feb 2024 02:17:00 +0000</pubDate>
    </item>
    <item>
      <title>0f8c74b1-5d9b-4ce6-859c-409f310255dd</title>
      <link>https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export</link>
      <description>{"uuid": "0f8c74b1-5d9b-4ce6-859c-409f310255dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/187245", "content": "https://ift.tt/M7ofSUt\nCVE-2023-33757 | SpliceCom iPCS/iPCS2 certificate validation", "creation_timestamp": "2024-02-18T13:41:43.000000Z"}</description>
      <content:encoded>{"uuid": "0f8c74b1-5d9b-4ce6-859c-409f310255dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "seen", "source": "https://t.me/ctinow/187245", "content": "https://ift.tt/M7ofSUt\nCVE-2023-33757 | SpliceCom iPCS/iPCS2 certificate validation", "creation_timestamp": "2024-02-18T13:41:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f8c74b1-5d9b-4ce6-859c-409f310255dd/export</guid>
      <pubDate>Sun, 18 Feb 2024 13:41:43 +0000</pubDate>
    </item>
    <item>
      <title>d1a20a39-a6fb-4299-8ac2-5158ea3af76e</title>
      <link>https://vulnerability.circl.lu/sighting/d1a20a39-a6fb-4299-8ac2-5158ea3af76e/export</link>
      <description>{"uuid": "d1a20a39-a6fb-4299-8ac2-5158ea3af76e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/187246", "content": "https://ift.tt/pk0ge8C\nCVE-2023-33758 | SpliceCom Maximiser Soft PBX up to 1.5 Login CLIENT_NAME/DEVICE_GUID cross site scripting", "creation_timestamp": "2024-02-18T13:41:44.000000Z"}</description>
      <content:encoded>{"uuid": "d1a20a39-a6fb-4299-8ac2-5158ea3af76e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "seen", "source": "https://t.me/ctinow/187246", "content": "https://ift.tt/pk0ge8C\nCVE-2023-33758 | SpliceCom Maximiser Soft PBX up to 1.5 Login CLIENT_NAME/DEVICE_GUID cross site scripting", "creation_timestamp": "2024-02-18T13:41:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d1a20a39-a6fb-4299-8ac2-5158ea3af76e/export</guid>
      <pubDate>Sun, 18 Feb 2024 13:41:44 +0000</pubDate>
    </item>
    <item>
      <title>8d4ac28a-fa08-4618-9d01-b1438bac272a</title>
      <link>https://vulnerability.circl.lu/sighting/8d4ac28a-fa08-4618-9d01-b1438bac272a/export</link>
      <description>{"uuid": "8d4ac28a-fa08-4618-9d01-b1438bac272a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/187247", "content": "https://ift.tt/FmkJlG6\nCVE-2023-33759 | SpliceCom Maximiser Soft PBX up to 1.5 excessive authentication", "creation_timestamp": "2024-02-18T13:41:45.000000Z"}</description>
      <content:encoded>{"uuid": "8d4ac28a-fa08-4618-9d01-b1438bac272a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33759", "type": "seen", "source": "https://t.me/ctinow/187247", "content": "https://ift.tt/FmkJlG6\nCVE-2023-33759 | SpliceCom Maximiser Soft PBX up to 1.5 excessive authentication", "creation_timestamp": "2024-02-18T13:41:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8d4ac28a-fa08-4618-9d01-b1438bac272a/export</guid>
      <pubDate>Sun, 18 Feb 2024 13:41:45 +0000</pubDate>
    </item>
    <item>
      <title>c80219e6-e8bd-44f3-afb9-660176f36c46</title>
      <link>https://vulnerability.circl.lu/sighting/c80219e6-e8bd-44f3-afb9-660176f36c46/export</link>
      <description>{"uuid": "c80219e6-e8bd-44f3-afb9-660176f36c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33758\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the CLIENT_NAME and DEVICE_GUID fields in the login component.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:35:13.162Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:30.000000Z"}</description>
      <content:encoded>{"uuid": "c80219e6-e8bd-44f3-afb9-660176f36c46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33758", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33758\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the CLIENT_NAME and DEVICE_GUID fields in the login component.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:35:13.162Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c80219e6-e8bd-44f3-afb9-660176f36c46/export</guid>
      <pubDate>Fri, 20 Jun 2025 19:43:30 +0000</pubDate>
    </item>
    <item>
      <title>e5e592de-940c-4c4f-b21b-5c0278232a66</title>
      <link>https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export</link>
      <description>{"uuid": "e5e592de-940c-4c4f-b21b-5c0278232a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33757\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:34:27.669Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:31.000000Z"}</description>
      <content:encoded>{"uuid": "e5e592de-940c-4c4f-b21b-5c0278232a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19047", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33757\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (iOS App) v2.8 and before, and iPCS (Android App) v1.8.5 and before allows attackers to eavesdrop on communications via a man-in-the-middle attack.\n\ud83d\udccf Published: 2024-01-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T19:34:27.669Z\n\ud83d\udd17 References:\n1. https://github.com/twignet/splicecom", "creation_timestamp": "2025-06-20T19:43:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e5e592de-940c-4c4f-b21b-5c0278232a66/export</guid>
      <pubDate>Fri, 20 Jun 2025 19:43:31 +0000</pubDate>
    </item>
    <item>
      <title>d9a50009-57da-4888-9a3b-bff95abf03b1</title>
      <link>https://vulnerability.circl.lu/sighting/d9a50009-57da-4888-9a3b-bff95abf03b1/export</link>
      <description>{"uuid": "d9a50009-57da-4888-9a3b-bff95abf03b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3375", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ly7rpb3bgbr2", "content": "", "creation_timestamp": "2025-09-07T03:48:20.930514Z"}</description>
      <content:encoded>{"uuid": "d9a50009-57da-4888-9a3b-bff95abf03b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3375", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ly7rpb3bgbr2", "content": "", "creation_timestamp": "2025-09-07T03:48:20.930514Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9a50009-57da-4888-9a3b-bff95abf03b1/export</guid>
      <pubDate>Sun, 07 Sep 2025 03:48:20 +0000</pubDate>
    </item>
  </channel>
</rss>
