<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:20:04 +0000</lastBuildDate>
    <item>
      <title>77d3e8b6-c540-407c-8de9-d612132bd7bb</title>
      <link>https://vulnerability.circl.lu/sighting/77d3e8b6-c540-407c-8de9-d612132bd7bb/export</link>
      <description>{"uuid": "77d3e8b6-c540-407c-8de9-d612132bd7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/cibsecurity/8310", "content": "ATENTION\u203c New - CVE-2011-3583\n\nIt was found that Typo3 Core versions 4.5.0 - 4.5.5 uses prepared statements that, if the parameter values are not properly replaced, could lead to a SQL Injection vulnerability. This issue can only be exploited if two or more parameters are bound to the query and at least two come from user input.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T02:32:17.000000Z"}</description>
      <content:encoded>{"uuid": "77d3e8b6-c540-407c-8de9-d612132bd7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/cibsecurity/8310", "content": "ATENTION\u203c New - CVE-2011-3583\n\nIt was found that Typo3 Core versions 4.5.0 - 4.5.5 uses prepared statements that, if the parameter values are not properly replaced, could lead to a SQL Injection vulnerability. This issue can only be exploited if two or more parameters are bound to the query and at least two come from user input.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T02:32:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/77d3e8b6-c540-407c-8de9-d612132bd7bb/export</guid>
      <pubDate>Tue, 26 Nov 2019 02:32:17 +0000</pubDate>
    </item>
    <item>
      <title>3812cf63-0974-4df4-a5aa-168129b48a7e</title>
      <link>https://vulnerability.circl.lu/sighting/3812cf63-0974-4df4-a5aa-168129b48a7e/export</link>
      <description>{"uuid": "3812cf63-0974-4df4-a5aa-168129b48a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/ctinow/194691", "content": "https://ift.tt/SsMaKxq\nCVE-2011-3583 | TYPO3 up to 4.5.5 Parameter sql injection (OSVDB-75584 / ID 100641)", "creation_timestamp": "2024-02-27T18:22:27.000000Z"}</description>
      <content:encoded>{"uuid": "3812cf63-0974-4df4-a5aa-168129b48a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3583", "type": "seen", "source": "https://t.me/ctinow/194691", "content": "https://ift.tt/SsMaKxq\nCVE-2011-3583 | TYPO3 up to 4.5.5 Parameter sql injection (OSVDB-75584 / ID 100641)", "creation_timestamp": "2024-02-27T18:22:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3812cf63-0974-4df4-a5aa-168129b48a7e/export</guid>
      <pubDate>Tue, 27 Feb 2024 18:22:27 +0000</pubDate>
    </item>
  </channel>
</rss>
