<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:30:05 +0000</lastBuildDate>
    <item>
      <title>a5172418-37cb-4ed9-a68b-81dd209d249e</title>
      <link>https://db.gcve.eu/sighting/a5172418-37cb-4ed9-a68b-81dd209d249e/export</link>
      <description>{"uuid": "a5172418-37cb-4ed9-a68b-81dd209d249e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161294", "content": "https://ift.tt/PEkTn8K\nCVE-2024-0181 | RRJ Nueva Ecija Engineer Online Portal 1.0 Admin Panel /admin/admin_user.php Firstname/Lastname/Username cross site scripting", "creation_timestamp": "2024-01-01T12:36:48.000000Z"}</description>
      <content:encoded>{"uuid": "a5172418-37cb-4ed9-a68b-81dd209d249e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161294", "content": "https://ift.tt/PEkTn8K\nCVE-2024-0181 | RRJ Nueva Ecija Engineer Online Portal 1.0 Admin Panel /admin/admin_user.php Firstname/Lastname/Username cross site scripting", "creation_timestamp": "2024-01-01T12:36:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a5172418-37cb-4ed9-a68b-81dd209d249e/export</guid>
      <pubDate>Mon, 01 Jan 2024 12:36:48 +0000</pubDate>
    </item>
    <item>
      <title>8aa61955-a79c-430e-b82f-9f3156ec52db</title>
      <link>https://db.gcve.eu/sighting/8aa61955-a79c-430e-b82f-9f3156ec52db/export</link>
      <description>{"uuid": "8aa61955-a79c-430e-b82f-9f3156ec52db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161395", "content": "https://ift.tt/yRhlw0M\nCVE-2024-0181", "creation_timestamp": "2024-01-01T18:26:09.000000Z"}</description>
      <content:encoded>{"uuid": "8aa61955-a79c-430e-b82f-9f3156ec52db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/161395", "content": "https://ift.tt/yRhlw0M\nCVE-2024-0181", "creation_timestamp": "2024-01-01T18:26:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8aa61955-a79c-430e-b82f-9f3156ec52db/export</guid>
      <pubDate>Mon, 01 Jan 2024 18:26:09 +0000</pubDate>
    </item>
    <item>
      <title>1683fdf7-b579-4d29-8bb0-0673ce18069b</title>
      <link>https://db.gcve.eu/sighting/1683fdf7-b579-4d29-8bb0-0673ce18069b/export</link>
      <description>{"uuid": "1683fdf7-b579-4d29-8bb0-0673ce18069b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/cibsecurity/74094", "content": "\u203c\ufe0fCVE-2024-0181\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file adminadminuser.php of the component Admin Panel. The manipulation of the argument FirstnameLastnameUsername leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249433 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:26.000000Z"}</description>
      <content:encoded>{"uuid": "1683fdf7-b579-4d29-8bb0-0673ce18069b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/cibsecurity/74094", "content": "\u203c\ufe0fCVE-2024-0181\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file adminadminuser.php of the component Admin Panel. The manipulation of the argument FirstnameLastnameUsername leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249433 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1683fdf7-b579-4d29-8bb0-0673ce18069b/export</guid>
      <pubDate>Tue, 02 Jan 2024 01:31:26 +0000</pubDate>
    </item>
    <item>
      <title>57809b3d-dfba-4d67-8b04-3bcf44e1858e</title>
      <link>https://db.gcve.eu/sighting/57809b3d-dfba-4d67-8b04-3bcf44e1858e/export</link>
      <description>{"uuid": "57809b3d-dfba-4d67-8b04-3bcf44e1858e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/164639", "content": "https://ift.tt/Zcr1SpH\nCVE-2024-0181 Exploit", "creation_timestamp": "2024-01-08T21:17:17.000000Z"}</description>
      <content:encoded>{"uuid": "57809b3d-dfba-4d67-8b04-3bcf44e1858e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/ctinow/164639", "content": "https://ift.tt/Zcr1SpH\nCVE-2024-0181 Exploit", "creation_timestamp": "2024-01-08T21:17:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57809b3d-dfba-4d67-8b04-3bcf44e1858e/export</guid>
      <pubDate>Mon, 08 Jan 2024 21:17:17 +0000</pubDate>
    </item>
    <item>
      <title>b96edca4-ec34-40a3-b8f5-cb401db95e1e</title>
      <link>https://db.gcve.eu/sighting/b96edca4-ec34-40a3-b8f5-cb401db95e1e/export</link>
      <description>{"uuid": "b96edca4-ec34-40a3-b8f5-cb401db95e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/arpsyndicate/3072", "content": "#ExploitObserverAlert\n\nCVE-2024-0181\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0181. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T21:08:30.000000Z"}</description>
      <content:encoded>{"uuid": "b96edca4-ec34-40a3-b8f5-cb401db95e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0181", "type": "seen", "source": "https://t.me/arpsyndicate/3072", "content": "#ExploitObserverAlert\n\nCVE-2024-0181\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0181. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T21:08:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b96edca4-ec34-40a3-b8f5-cb401db95e1e/export</guid>
      <pubDate>Fri, 26 Jan 2024 21:08:30 +0000</pubDate>
    </item>
  </channel>
</rss>
