<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 16:49:47 +0000</lastBuildDate>
    <item>
      <title>b2d6803f-4b6e-4028-a097-677e77df0925</title>
      <link>https://vulnerability.circl.lu/sighting/b2d6803f-4b6e-4028-a097-677e77df0925/export</link>
      <description>{"uuid": "b2d6803f-4b6e-4028-a097-677e77df0925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/162600", "content": "https://ift.tt/RYgurnp\nCVE-2023-5879", "creation_timestamp": "2024-01-03T21:27:04.000000Z"}</description>
      <content:encoded>{"uuid": "b2d6803f-4b6e-4028-a097-677e77df0925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/162600", "content": "https://ift.tt/RYgurnp\nCVE-2023-5879", "creation_timestamp": "2024-01-03T21:27:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b2d6803f-4b6e-4028-a097-677e77df0925/export</guid>
      <pubDate>Wed, 03 Jan 2024 21:27:04 +0000</pubDate>
    </item>
    <item>
      <title>75c80747-6a2f-4a83-95e6-6e70372ce539</title>
      <link>https://vulnerability.circl.lu/sighting/75c80747-6a2f-4a83-95e6-6e70372ce539/export</link>
      <description>{"uuid": "75c80747-6a2f-4a83-95e6-6e70372ce539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/cibsecurity/74341", "content": "\u203c\ufe0fCVE-2023-5879\u203c\ufe0f\n\nUsers product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 and below on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:38.000000Z"}</description>
      <content:encoded>{"uuid": "75c80747-6a2f-4a83-95e6-6e70372ce539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/cibsecurity/74341", "content": "\u203c\ufe0fCVE-2023-5879\u203c\ufe0f\n\nUsers product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 and below on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/75c80747-6a2f-4a83-95e6-6e70372ce539/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:37:38 +0000</pubDate>
    </item>
    <item>
      <title>0c4df548-2cee-4f97-93c2-5f2ff526c01a</title>
      <link>https://vulnerability.circl.lu/sighting/0c4df548-2cee-4f97-93c2-5f2ff526c01a/export</link>
      <description>{"uuid": "0c4df548-2cee-4f97-93c2-5f2ff526c01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/arpsyndicate/2520", "content": "#ExploitObserverAlert\n\nCVE-2023-5879\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5879. Users\u2019 product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.", "creation_timestamp": "2024-01-05T20:36:28.000000Z"}</description>
      <content:encoded>{"uuid": "0c4df548-2cee-4f97-93c2-5f2ff526c01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/arpsyndicate/2520", "content": "#ExploitObserverAlert\n\nCVE-2023-5879\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5879. Users\u2019 product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.", "creation_timestamp": "2024-01-05T20:36:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0c4df548-2cee-4f97-93c2-5f2ff526c01a/export</guid>
      <pubDate>Fri, 05 Jan 2024 20:36:28 +0000</pubDate>
    </item>
    <item>
      <title>d38aac30-e5c3-43fd-a1a9-ad6803381f37</title>
      <link>https://vulnerability.circl.lu/sighting/d38aac30-e5c3-43fd-a1a9-ad6803381f37/export</link>
      <description>{"uuid": "d38aac30-e5c3-43fd-a1a9-ad6803381f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/172363", "content": "https://ift.tt/MHFAvU9\nCVE-2023-5879 | The Genie Company Aladdin Connect Mobile Application up to 5.65 Build 2075 on Android insecure storage of sensitive information", "creation_timestamp": "2024-01-23T22:31:35.000000Z"}</description>
      <content:encoded>{"uuid": "d38aac30-e5c3-43fd-a1a9-ad6803381f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/172363", "content": "https://ift.tt/MHFAvU9\nCVE-2023-5879 | The Genie Company Aladdin Connect Mobile Application up to 5.65 Build 2075 on Android insecure storage of sensitive information", "creation_timestamp": "2024-01-23T22:31:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d38aac30-e5c3-43fd-a1a9-ad6803381f37/export</guid>
      <pubDate>Tue, 23 Jan 2024 22:31:35 +0000</pubDate>
    </item>
  </channel>
</rss>
