<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:35:13.138903+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/fd62ea5f-a087-4ebf-a5ae-c05d0d866f88/export</id>
    <title>fd62ea5f-a087-4ebf-a5ae-c05d0d866f88</title>
    <updated>2026-05-06T17:35:13.586831+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fd62ea5f-a087-4ebf-a5ae-c05d0d866f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/161438", "content": "https://ift.tt/IP7sJUM\nCVE-2024-0184", "creation_timestamp": "2024-01-02T01:26:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fd62ea5f-a087-4ebf-a5ae-c05d0d866f88/export"/>
    <published>2024-01-02T01:26:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3a05c93b-48bd-4402-a919-8be8001fbc61/export</id>
    <title>3a05c93b-48bd-4402-a919-8be8001fbc61</title>
    <updated>2026-05-06T17:35:13.586704+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3a05c93b-48bd-4402-a919-8be8001fbc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/cibsecurity/74099", "content": "\u203c\ufe0fCVE-2024-0184\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file admineditteacher.php of the component Add Enginer. The manipulation of the argument FirstnameLastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB249442 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3a05c93b-48bd-4402-a919-8be8001fbc61/export"/>
    <published>2024-01-02T01:31:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7/export</id>
    <title>b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7</title>
    <updated>2026-05-06T17:35:13.586575+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/164637", "content": "https://ift.tt/GLBegWs\nCVE-2024-0184 Exploit", "creation_timestamp": "2024-01-08T21:17:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7/export"/>
    <published>2024-01-08T21:17:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c855aac-9080-40f5-bcb1-8c1b77c51c26/export</id>
    <title>3c855aac-9080-40f5-bcb1-8c1b77c51c26</title>
    <updated>2026-05-06T17:35:13.586431+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3c855aac-9080-40f5-bcb1-8c1b77c51c26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/171160", "content": "https://ift.tt/uomFKUw\nCVE-2024-0184 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Enginer /admin/edit_teacher.php Firstname/Lastname cross site scripting", "creation_timestamp": "2024-01-22T13:41:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c855aac-9080-40f5-bcb1-8c1b77c51c26/export"/>
    <published>2024-01-22T13:41:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d00d96df-5bcc-46ae-b6fd-5d77bb772725/export</id>
    <title>d00d96df-5bcc-46ae-b6fd-5d77bb772725</title>
    <updated>2026-05-06T17:35:13.584969+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d00d96df-5bcc-46ae-b6fd-5d77bb772725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/arpsyndicate/3007", "content": "#ExploitObserverAlert\n\nCVE-2024-0184\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0184. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T17:10:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d00d96df-5bcc-46ae-b6fd-5d77bb772725/export"/>
    <published>2024-01-26T17:10:09+00:00</published>
  </entry>
</feed>
