<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:55:00.575155+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94eeae48-bafd-46a3-a627-c1b0121af9b2/export</id>
    <title>94eeae48-bafd-46a3-a627-c1b0121af9b2</title>
    <updated>2026-05-04T19:55:00.909172+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94eeae48-bafd-46a3-a627-c1b0121af9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/162601", "content": "https://ift.tt/zJqaj8k\nCVE-2023-5880", "creation_timestamp": "2024-01-03T21:27:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94eeae48-bafd-46a3-a627-c1b0121af9b2/export"/>
    <published>2024-01-03T21:27:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e9ee8897-872b-4f11-8635-227e66cc10d5/export</id>
    <title>e9ee8897-872b-4f11-8635-227e66cc10d5</title>
    <updated>2026-05-04T19:55:00.909094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e9ee8897-872b-4f11-8635-227e66cc10d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/cibsecurity/74342", "content": "\u203c\ufe0fCVE-2023-5880\u203c\ufe0f\n\nWhen the Genie Company Aladdin Connect garage door opener RetrofitKit Model ALDCM is placed into configuration mode the web servers Garage Door Control Module Setup page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script andor HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script andor HTML into the users' web browser.\u00a0 \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e9ee8897-872b-4f11-8635-227e66cc10d5/export"/>
    <published>2024-01-04T01:37:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1314615-091b-4e92-8b9d-9cdb57ff720e/export</id>
    <title>c1314615-091b-4e92-8b9d-9cdb57ff720e</title>
    <updated>2026-05-04T19:55:00.908970+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1314615-091b-4e92-8b9d-9cdb57ff720e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/arpsyndicate/2479", "content": "#ExploitObserverAlert\n\nCVE-2023-5880\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5880. When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers \u201cGarage Door Control Module Setup\u201d page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script and/or HTML into the users' web browser.", "creation_timestamp": "2024-01-05T13:56:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1314615-091b-4e92-8b9d-9cdb57ff720e/export"/>
    <published>2024-01-05T13:56:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/962858fb-83b0-49d6-b699-37b07ad50867/export</id>
    <title>962858fb-83b0-49d6-b699-37b07ad50867</title>
    <updated>2026-05-04T19:55:00.905893+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "962858fb-83b0-49d6-b699-37b07ad50867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/172364", "content": "https://ift.tt/L5RP3uN\nCVE-2023-5880 | The Genie Company Aladdin Connect up to 14.1.1 Garage Door Control Module Setup Page cross site scripting", "creation_timestamp": "2024-01-23T22:31:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/962858fb-83b0-49d6-b699-37b07ad50867/export"/>
    <published>2024-01-23T22:31:36+00:00</published>
  </entry>
</feed>
