<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:36:55 +0000</lastBuildDate>
    <item>
      <title>23ba0d16-ce6e-43a6-b490-48a33369545f</title>
      <link>https://vulnerability.circl.lu/sighting/23ba0d16-ce6e-43a6-b490-48a33369545f/export</link>
      <description>{"uuid": "23ba0d16-ce6e-43a6-b490-48a33369545f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36663", "type": "seen", "source": "https://t.me/cibsecurity/59423", "content": "\u203c CVE-2020-36663 \u203c\n\nA vulnerability, which was classified as problematic, was found in Artes\u00c3\u00a3os SEOTools up to 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222231.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-04T12:35:51.000000Z"}</description>
      <content:encoded>{"uuid": "23ba0d16-ce6e-43a6-b490-48a33369545f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-36663", "type": "seen", "source": "https://t.me/cibsecurity/59423", "content": "\u203c CVE-2020-36663 \u203c\n\nA vulnerability, which was classified as problematic, was found in Artes\u00c3\u00a3os SEOTools up to 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222231.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-04T12:35:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/23ba0d16-ce6e-43a6-b490-48a33369545f/export</guid>
      <pubDate>Sat, 04 Mar 2023 12:35:51 +0000</pubDate>
    </item>
  </channel>
</rss>
