<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:39:57 +0000</lastBuildDate>
    <item>
      <title>f9dbd416-92da-428f-b2bd-0d0bb6fb639f</title>
      <link>https://vulnerability.circl.lu/sighting/f9dbd416-92da-428f-b2bd-0d0bb6fb639f/export</link>
      <description>{"uuid": "f9dbd416-92da-428f-b2bd-0d0bb6fb639f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/cibsecurity/8323", "content": "ATENTION\u203c New - CVE-2011-3606\n\nA DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T08:57:29.000000Z"}</description>
      <content:encoded>{"uuid": "f9dbd416-92da-428f-b2bd-0d0bb6fb639f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/cibsecurity/8323", "content": "ATENTION\u203c New - CVE-2011-3606\n\nA DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T08:57:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9dbd416-92da-428f-b2bd-0d0bb6fb639f/export</guid>
      <pubDate>Tue, 26 Nov 2019 08:57:29 +0000</pubDate>
    </item>
    <item>
      <title>85002616-bde6-4b6e-844c-dba017aee259</title>
      <link>https://vulnerability.circl.lu/sighting/85002616-bde6-4b6e-844c-dba017aee259/export</link>
      <description>{"uuid": "85002616-bde6-4b6e-844c-dba017aee259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/ctinow/194694", "content": "https://ift.tt/on1E8uO\nCVE-2011-3606 | Red Hat JBoss Application Server up to 7.0.x Aministration Console DOM-Based cross site scripting (OSVDB-77457)", "creation_timestamp": "2024-02-27T18:22:33.000000Z"}</description>
      <content:encoded>{"uuid": "85002616-bde6-4b6e-844c-dba017aee259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3606", "type": "seen", "source": "https://t.me/ctinow/194694", "content": "https://ift.tt/on1E8uO\nCVE-2011-3606 | Red Hat JBoss Application Server up to 7.0.x Aministration Console DOM-Based cross site scripting (OSVDB-77457)", "creation_timestamp": "2024-02-27T18:22:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/85002616-bde6-4b6e-844c-dba017aee259/export</guid>
      <pubDate>Tue, 27 Feb 2024 18:22:33 +0000</pubDate>
    </item>
  </channel>
</rss>
