<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:40:55.169806+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a5172418-37cb-4ed9-a68b-81dd209d249e/export</id>
    <title>a5172418-37cb-4ed9-a68b-81dd209d249e</title>
    <updated>2026-05-06T17:40:55.596134+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a5172418-37cb-4ed9-a68b-81dd209d249e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161294", "content": "https://ift.tt/PEkTn8K\nCVE-2024-0181 | RRJ Nueva Ecija Engineer Online Portal 1.0 Admin Panel /admin/admin_user.php Firstname/Lastname/Username cross site scripting", "creation_timestamp": "2024-01-01T12:36:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a5172418-37cb-4ed9-a68b-81dd209d249e/export"/>
    <published>2024-01-01T12:36:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8aa61955-a79c-430e-b82f-9f3156ec52db/export</id>
    <title>8aa61955-a79c-430e-b82f-9f3156ec52db</title>
    <updated>2026-05-06T17:40:55.596081+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8aa61955-a79c-430e-b82f-9f3156ec52db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161395", "content": "https://ift.tt/yRhlw0M\nCVE-2024-0181", "creation_timestamp": "2024-01-01T18:26:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8aa61955-a79c-430e-b82f-9f3156ec52db/export"/>
    <published>2024-01-01T18:26:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1683fdf7-b579-4d29-8bb0-0673ce18069b/export</id>
    <title>1683fdf7-b579-4d29-8bb0-0673ce18069b</title>
    <updated>2026-05-06T17:40:55.596020+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1683fdf7-b579-4d29-8bb0-0673ce18069b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/cibsecurity/74094", "content": "\u203c\ufe0fCVE-2024-0181\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file adminadminuser.php of the component Admin Panel. The manipulation of the argument FirstnameLastnameUsername leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249433 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1683fdf7-b579-4d29-8bb0-0673ce18069b/export"/>
    <published>2024-01-02T01:31:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57809b3d-dfba-4d67-8b04-3bcf44e1858e/export</id>
    <title>57809b3d-dfba-4d67-8b04-3bcf44e1858e</title>
    <updated>2026-05-06T17:40:55.595932+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "57809b3d-dfba-4d67-8b04-3bcf44e1858e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/164639", "content": "https://ift.tt/Zcr1SpH\nCVE-2024-0181 Exploit", "creation_timestamp": "2024-01-08T21:17:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57809b3d-dfba-4d67-8b04-3bcf44e1858e/export"/>
    <published>2024-01-08T21:17:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b96edca4-ec34-40a3-b8f5-cb401db95e1e/export</id>
    <title>b96edca4-ec34-40a3-b8f5-cb401db95e1e</title>
    <updated>2026-05-06T17:40:55.594657+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b96edca4-ec34-40a3-b8f5-cb401db95e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/arpsyndicate/3072", "content": "#ExploitObserverAlert\n\nCVE-2024-0181\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0181. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T21:08:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b96edca4-ec34-40a3-b8f5-cb401db95e1e/export"/>
    <published>2024-01-26T21:08:30+00:00</published>
  </entry>
</feed>
