{"vulnerability": "cve-2023-5879", "sightings": [{"uuid": "d38aac30-e5c3-43fd-a1a9-ad6803381f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/172363", "content": "https://ift.tt/MHFAvU9\nCVE-2023-5879 | The Genie Company Aladdin Connect Mobile Application up to 5.65 Build 2075 on Android insecure storage of sensitive information", "creation_timestamp": "2024-01-23T22:31:35.000000Z"}, {"uuid": "75c80747-6a2f-4a83-95e6-6e70372ce539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/cibsecurity/74341", "content": "\u203c\ufe0fCVE-2023-5879\u203c\ufe0f\n\nUsers product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 and below on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:37:38.000000Z"}, {"uuid": "b2d6803f-4b6e-4028-a097-677e77df0925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/ctinow/162600", "content": "https://ift.tt/RYgurnp\nCVE-2023-5879", "creation_timestamp": "2024-01-03T21:27:04.000000Z"}, {"uuid": "0c4df548-2cee-4f97-93c2-5f2ff526c01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-5879", "type": "seen", "source": "https://t.me/arpsyndicate/2520", "content": "#ExploitObserverAlert\n\nCVE-2023-5879\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5879. Users\u2019 product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.", "creation_timestamp": "2024-01-05T20:36:28.000000Z"}]}