<?xml version='1.0' encoding='UTF-8'?>
<rss version='2.0'>
	<channel>
		<title>cotonti.com : SQL injection vulnerability cotonti !!</title>
		<link>https://www.cotonti.com</link>
		<description>Laatste forum onderwerpen</description>
		<generator>Cotonti</generator>
		<language>en</language>
		<pubDate>Mon, 06 Apr 2026 00:45:41 -0000</pubDate>

		<item>
			<title>Slaweally</title>
			<description><![CDATA[<p><span class="short_text" lang="en" xml:lang="en"><span class="hps">yes</span> <span class="hps">I did</span> <span class="hps">it</span>, but <span class="hps">it</span> <span class="hps">can be</span> <span class="hps">further</span></span></p>
]]></description>
			<pubDate>Di, 22 Okt 2013 07:15:07 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/nl/forums?m=posts&q=7560&d=0#post38209]]></link>
		</item>
		<item>
			<title>Xerora</title>
			<description><![CDATA[<p>No actual injection can be preformed here. This is a bug and it was fixed in 0.9.14.</p>
]]></description>
			<pubDate>Ma, 21 Okt 2013 19:10:01 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/nl/forums?m=posts&q=7560&d=0#post38206]]></link>
		</item>
		<item>
			<title>Slaweally</title>
			<description><![CDATA[<p>hello<br />
Particularly within the site link to the survey is part of the php and sql id is causing vulnerability measure should be.</p>

<p><span class="short_text" lang="en" xml:lang="en"><span class="hps">look at the picture</span></span></p>

<p>http://n1310.hizliresim.com/1g/p/ttbln.png</p>
]]></description>
			<pubDate>Ma, 21 Okt 2013 18:29:57 -0000</pubDate>
			<link><![CDATA[https://www.cotonti.com/nl/forums?m=posts&q=7560&d=0#post38205]]></link>
		</item>
	</channel>
</rss>