<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:06:32 +0000</lastBuildDate>
    <item>
      <title>f2242043-a6b1-487b-9416-333aad3380d6</title>
      <link>https://vulnerability.circl.lu/sighting/f2242043-a6b1-487b-9416-333aad3380d6/export</link>
      <description>{"uuid": "f2242043-a6b1-487b-9416-333aad3380d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3630", "type": "seen", "source": "https://t.me/cibsecurity/8319", "content": "ATENTION\u203c New - CVE-2011-3630\n\nHardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T08:57:26.000000Z"}</description>
      <content:encoded>{"uuid": "f2242043-a6b1-487b-9416-333aad3380d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3630", "type": "seen", "source": "https://t.me/cibsecurity/8319", "content": "ATENTION\u203c New - CVE-2011-3630\n\nHardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-11-26T08:57:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2242043-a6b1-487b-9416-333aad3380d6/export</guid>
      <pubDate>Tue, 26 Nov 2019 08:57:26 +0000</pubDate>
    </item>
    <item>
      <title>ec95177f-15b2-4c66-8ae1-561869bea597</title>
      <link>https://vulnerability.circl.lu/sighting/ec95177f-15b2-4c66-8ae1-561869bea597/export</link>
      <description>{"uuid": "ec95177f-15b2-4c66-8ae1-561869bea597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3630", "type": "seen", "source": "https://t.me/ctinow/194744", "content": "https://ift.tt/cGFjLqJ\nCVE-2011-3630 | Hardlink up to 0.1.1 out-of-bounds write (Nessus ID 57069 / BID-50805)", "creation_timestamp": "2024-02-27T18:52:21.000000Z"}</description>
      <content:encoded>{"uuid": "ec95177f-15b2-4c66-8ae1-561869bea597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2011-3630", "type": "seen", "source": "https://t.me/ctinow/194744", "content": "https://ift.tt/cGFjLqJ\nCVE-2011-3630 | Hardlink up to 0.1.1 out-of-bounds write (Nessus ID 57069 / BID-50805)", "creation_timestamp": "2024-02-27T18:52:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ec95177f-15b2-4c66-8ae1-561869bea597/export</guid>
      <pubDate>Tue, 27 Feb 2024 18:52:21 +0000</pubDate>
    </item>
  </channel>
</rss>
