<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:26:14.114555+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export</id>
    <title>ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33</title>
    <updated>2026-05-06T18:26:14.508139+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/162030", "content": "https://ift.tt/tn1Wkz0\nCVE-2024-0192", "creation_timestamp": "2024-01-02T21:26:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export"/>
    <published>2024-01-02T21:26:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export</id>
    <title>30b493b2-a2a0-418f-b24a-7480df1fe574</title>
    <updated>2026-05-06T18:26:14.508043+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "30b493b2-a2a0-418f-b24a-7480df1fe574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/cibsecurity/74196", "content": "\u203c\ufe0fCVE-2024-0192\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249505 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:36:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export"/>
    <published>2024-01-03T01:36:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export</id>
    <title>b4303ba0-f03e-47c5-9480-9042c94ad864</title>
    <updated>2026-05-06T18:26:14.507923+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b4303ba0-f03e-47c5-9480-9042c94ad864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/164499", "content": "https://ift.tt/KPZNJx8\nCVE-2024-0192 Exploit", "creation_timestamp": "2024-01-08T17:16:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export"/>
    <published>2024-01-08T17:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export</id>
    <title>54c817dd-05fb-43ff-a6c9-13b8084ff8c4</title>
    <updated>2026-05-06T18:26:14.507771+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "54c817dd-05fb-43ff-a6c9-13b8084ff8c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/171342", "content": "https://ift.tt/zYZtWxo\nCVE-2024-0192 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Downloadable downloadable.php unrestricted upload", "creation_timestamp": "2024-01-22T18:11:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export"/>
    <published>2024-01-22T18:11:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export</id>
    <title>0944ead5-abbe-4fd8-baad-dfc0addd19f7</title>
    <updated>2026-05-06T18:26:14.506305+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0944ead5-abbe-4fd8-baad-dfc0addd19f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2985", "content": "#ExploitObserverAlert\n\nCVE-2024-0192\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0192. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-26T15:32:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export"/>
    <published>2024-01-26T15:32:57+00:00</published>
  </entry>
</feed>
