<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:45 +0000</lastBuildDate>
    <item>
      <title>94eeae48-bafd-46a3-a627-c1b0121af9b2</title>
      <link>https://vulnerability.circl.lu/sighting/94eeae48-bafd-46a3-a627-c1b0121af9b2/export</link>
      <description>{"uuid": "94eeae48-bafd-46a3-a627-c1b0121af9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/162601", "content": "https://ift.tt/zJqaj8k\nCVE-2023-5880", "creation_timestamp": "2024-01-03T21:27:06.000000Z"}</description>
      <content:encoded>{"uuid": "94eeae48-bafd-46a3-a627-c1b0121af9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/162601", "content": "https://ift.tt/zJqaj8k\nCVE-2023-5880", "creation_timestamp": "2024-01-03T21:27:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/94eeae48-bafd-46a3-a627-c1b0121af9b2/export</guid>
      <pubDate>Wed, 03 Jan 2024 21:27:06 +0000</pubDate>
    </item>
    <item>
      <title>e9ee8897-872b-4f11-8635-227e66cc10d5</title>
      <link>https://vulnerability.circl.lu/sighting/e9ee8897-872b-4f11-8635-227e66cc10d5/export</link>
      <description>{"uuid": "e9ee8897-872b-4f11-8635-227e66cc10d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/cibsecurity/74342", "content": "\u203c\ufe0fCVE-2023-5880\u203c\ufe0f\n\nWhen the Genie Company Aladdin Connect garage door opener RetrofitKit Model ALDCM is placed into configuration mode the web servers Garage Door Control Module Setup page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script andor HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script andor HTML into the users' web browser.\u00a0 \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:43.000000Z"}</description>
      <content:encoded>{"uuid": "e9ee8897-872b-4f11-8635-227e66cc10d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/cibsecurity/74342", "content": "\u203c\ufe0fCVE-2023-5880\u203c\ufe0f\n\nWhen the Genie Company Aladdin Connect garage door opener RetrofitKit Model ALDCM is placed into configuration mode the web servers Garage Door Control Module Setup page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script andor HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script andor HTML into the users' web browser.\u00a0 \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e9ee8897-872b-4f11-8635-227e66cc10d5/export</guid>
      <pubDate>Thu, 04 Jan 2024 01:37:43 +0000</pubDate>
    </item>
    <item>
      <title>c1314615-091b-4e92-8b9d-9cdb57ff720e</title>
      <link>https://vulnerability.circl.lu/sighting/c1314615-091b-4e92-8b9d-9cdb57ff720e/export</link>
      <description>{"uuid": "c1314615-091b-4e92-8b9d-9cdb57ff720e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/arpsyndicate/2479", "content": "#ExploitObserverAlert\n\nCVE-2023-5880\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5880. When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers \u201cGarage Door Control Module Setup\u201d page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script and/or HTML into the users' web browser.", "creation_timestamp": "2024-01-05T13:56:14.000000Z"}</description>
      <content:encoded>{"uuid": "c1314615-091b-4e92-8b9d-9cdb57ff720e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/arpsyndicate/2479", "content": "#ExploitObserverAlert\n\nCVE-2023-5880\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5880. When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers \u201cGarage Door Control Module Setup\u201d page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious\u00a0code with client side Java Script and/or HTML into the users' web browser.", "creation_timestamp": "2024-01-05T13:56:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1314615-091b-4e92-8b9d-9cdb57ff720e/export</guid>
      <pubDate>Fri, 05 Jan 2024 13:56:14 +0000</pubDate>
    </item>
    <item>
      <title>962858fb-83b0-49d6-b699-37b07ad50867</title>
      <link>https://vulnerability.circl.lu/sighting/962858fb-83b0-49d6-b699-37b07ad50867/export</link>
      <description>{"uuid": "962858fb-83b0-49d6-b699-37b07ad50867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/172364", "content": "https://ift.tt/L5RP3uN\nCVE-2023-5880 | The Genie Company Aladdin Connect up to 14.1.1 Garage Door Control Module Setup Page cross site scripting", "creation_timestamp": "2024-01-23T22:31:36.000000Z"}</description>
      <content:encoded>{"uuid": "962858fb-83b0-49d6-b699-37b07ad50867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5880", "type": "seen", "source": "https://t.me/ctinow/172364", "content": "https://ift.tt/L5RP3uN\nCVE-2023-5880 | The Genie Company Aladdin Connect up to 14.1.1 Garage Door Control Module Setup Page cross site scripting", "creation_timestamp": "2024-01-23T22:31:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/962858fb-83b0-49d6-b699-37b07ad50867/export</guid>
      <pubDate>Tue, 23 Jan 2024 22:31:36 +0000</pubDate>
    </item>
  </channel>
</rss>
