<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:20:08.003441+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/77d3e8b6-c540-407c-8de9-d612132bd7bb/export</id>
    <title>77d3e8b6-c540-407c-8de9-d612132bd7bb</title>
    <updated>2026-05-04T10:20:08.385000+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "77d3e8b6-c540-407c-8de9-d612132bd7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/cibsecurity/8310", "content": "ATENTION\u203c New - CVE-2011-3583\n\nIt was found that Typo3 Core versions 4.5.0 - 4.5.5 uses prepared statements that, if the parameter values are not properly replaced, could lead to a SQL Injection vulnerability. This issue can only be exploited if two or more parameters are bound to the query and at least two come from user input.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T02:32:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/77d3e8b6-c540-407c-8de9-d612132bd7bb/export"/>
    <published>2019-11-26T02:32:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3812cf63-0974-4df4-a5aa-168129b48a7e/export</id>
    <title>3812cf63-0974-4df4-a5aa-168129b48a7e</title>
    <updated>2026-05-04T10:20:08.382192+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3812cf63-0974-4df4-a5aa-168129b48a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/ctinow/194691", "content": "https://ift.tt/SsMaKxq\nCVE-2011-3583 | TYPO3 up to 4.5.5 Parameter sql injection (OSVDB-75584 / ID 100641)", "creation_timestamp": "2024-02-27T18:22:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3812cf63-0974-4df4-a5aa-168129b48a7e/export"/>
    <published>2024-02-27T18:22:27+00:00</published>
  </entry>
</feed>
