<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:40:10.351162+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9dbd416-92da-428f-b2bd-0d0bb6fb639f/export</id>
    <title>f9dbd416-92da-428f-b2bd-0d0bb6fb639f</title>
    <updated>2026-05-04T09:40:10.663482+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9dbd416-92da-428f-b2bd-0d0bb6fb639f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/cibsecurity/8323", "content": "ATENTION\u203c New - CVE-2011-3606\n\nA DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T08:57:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9dbd416-92da-428f-b2bd-0d0bb6fb639f/export"/>
    <published>2019-11-26T08:57:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/85002616-bde6-4b6e-844c-dba017aee259/export</id>
    <title>85002616-bde6-4b6e-844c-dba017aee259</title>
    <updated>2026-05-04T09:40:10.660022+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "85002616-bde6-4b6e-844c-dba017aee259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/ctinow/194694", "content": "https://ift.tt/on1E8uO\nCVE-2011-3606 | Red Hat JBoss Application Server up to 7.0.x Aministration Console DOM-Based cross site scripting (OSVDB-77457)", "creation_timestamp": "2024-02-27T18:22:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/85002616-bde6-4b6e-844c-dba017aee259/export"/>
    <published>2024-02-27T18:22:33+00:00</published>
  </entry>
</feed>
