<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:34:02.173861+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b2d6803f-4b6e-4028-a097-677e77df0925/export</id>
    <title>b2d6803f-4b6e-4028-a097-677e77df0925</title>
    <updated>2026-05-04T10:34:02.529158+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b2d6803f-4b6e-4028-a097-677e77df0925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/162600", "content": "https://ift.tt/RYgurnp\nCVE-2023-5879", "creation_timestamp": "2024-01-03T21:27:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b2d6803f-4b6e-4028-a097-677e77df0925/export"/>
    <published>2024-01-03T21:27:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/75c80747-6a2f-4a83-95e6-6e70372ce539/export</id>
    <title>75c80747-6a2f-4a83-95e6-6e70372ce539</title>
    <updated>2026-05-04T10:34:02.529049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "75c80747-6a2f-4a83-95e6-6e70372ce539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/cibsecurity/74341", "content": "\u203c\ufe0fCVE-2023-5879\u203c\ufe0f\n\nUsers product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 and below on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/75c80747-6a2f-4a83-95e6-6e70372ce539/export"/>
    <published>2024-01-04T01:37:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0c4df548-2cee-4f97-93c2-5f2ff526c01a/export</id>
    <title>0c4df548-2cee-4f97-93c2-5f2ff526c01a</title>
    <updated>2026-05-04T10:34:02.528890+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0c4df548-2cee-4f97-93c2-5f2ff526c01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/arpsyndicate/2520", "content": "#ExploitObserverAlert\n\nCVE-2023-5879\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5879. Users\u2019 product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.", "creation_timestamp": "2024-01-05T20:36:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0c4df548-2cee-4f97-93c2-5f2ff526c01a/export"/>
    <published>2024-01-05T20:36:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d38aac30-e5c3-43fd-a1a9-ad6803381f37/export</id>
    <title>d38aac30-e5c3-43fd-a1a9-ad6803381f37</title>
    <updated>2026-05-04T10:34:02.526061+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d38aac30-e5c3-43fd-a1a9-ad6803381f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/172363", "content": "https://ift.tt/MHFAvU9\nCVE-2023-5879 | The Genie Company Aladdin Connect Mobile Application up to 5.65 Build 2075 on Android insecure storage of sensitive information", "creation_timestamp": "2024-01-23T22:31:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d38aac30-e5c3-43fd-a1a9-ad6803381f37/export"/>
    <published>2024-01-23T22:31:35+00:00</published>
  </entry>
</feed>
