<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:26:15.327032+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0f1e03db-c57e-4206-ae81-d9325c704b9c/export</id>
    <title>0f1e03db-c57e-4206-ae81-d9325c704b9c</title>
    <updated>2026-05-06T18:26:15.816214+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0f1e03db-c57e-4206-ae81-d9325c704b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/161442", "content": "https://ift.tt/uGgZM1E\nCVE-2024-0185", "creation_timestamp": "2024-01-02T02:26:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0f1e03db-c57e-4206-ae81-d9325c704b9c/export"/>
    <published>2024-01-02T02:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f136d441-6405-48aa-af43-7afebf65b7a7/export</id>
    <title>f136d441-6405-48aa-af43-7afebf65b7a7</title>
    <updated>2026-05-06T18:26:15.816148+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f136d441-6405-48aa-af43-7afebf65b7a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/cibsecurity/74120", "content": "\u203c\ufe0fCVE-2024-0185\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboardteacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249443.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:30:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f136d441-6405-48aa-af43-7afebf65b7a7/export"/>
    <published>2024-01-03T01:30:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1cb9ab44-cc6d-4269-a16a-4a8e65b3798f/export</id>
    <title>1cb9ab44-cc6d-4269-a16a-4a8e65b3798f</title>
    <updated>2026-05-06T18:26:15.816089+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1cb9ab44-cc6d-4269-a16a-4a8e65b3798f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/164636", "content": "https://ift.tt/28Val9U\nCVE-2024-0185 Exploit", "creation_timestamp": "2024-01-08T21:17:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1cb9ab44-cc6d-4269-a16a-4a8e65b3798f/export"/>
    <published>2024-01-08T21:17:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2d89b127-34cf-4aa0-bc25-e3cabadea404/export</id>
    <title>2d89b127-34cf-4aa0-bc25-e3cabadea404</title>
    <updated>2026-05-06T18:26:15.816007+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2d89b127-34cf-4aa0-bc25-e3cabadea404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/171161", "content": "https://ift.tt/raF5VDO\nCVE-2024-0185 | RRJ Nueva Ecija Engineer Online Portal 1.0 Avatar dasboard_teacher.php unrestricted upload", "creation_timestamp": "2024-01-22T13:41:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2d89b127-34cf-4aa0-bc25-e3cabadea404/export"/>
    <published>2024-01-22T13:41:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9cab636a-4706-4650-aa80-6d3e373b0231/export</id>
    <title>9cab636a-4706-4650-aa80-6d3e373b0231</title>
    <updated>2026-05-06T18:26:15.814737+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9cab636a-4706-4650-aa80-6d3e373b0231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/arpsyndicate/3101", "content": "#ExploitObserverAlert\n\nCVE-2024-0185\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0185. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.\n\nFIRST-EPSS: 0.000610000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-26T22:38:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9cab636a-4706-4650-aa80-6d3e373b0231/export"/>
    <published>2024-01-26T22:38:31+00:00</published>
  </entry>
</feed>
