<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:26:13 +0000</lastBuildDate>
    <item>
      <title>fd62ea5f-a087-4ebf-a5ae-c05d0d866f88</title>
      <link>https://db.gcve.eu/sighting/fd62ea5f-a087-4ebf-a5ae-c05d0d866f88/export</link>
      <description>{"uuid": "fd62ea5f-a087-4ebf-a5ae-c05d0d866f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/161438", "content": "https://ift.tt/IP7sJUM\nCVE-2024-0184", "creation_timestamp": "2024-01-02T01:26:32.000000Z"}</description>
      <content:encoded>{"uuid": "fd62ea5f-a087-4ebf-a5ae-c05d0d866f88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/161438", "content": "https://ift.tt/IP7sJUM\nCVE-2024-0184", "creation_timestamp": "2024-01-02T01:26:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fd62ea5f-a087-4ebf-a5ae-c05d0d866f88/export</guid>
      <pubDate>Tue, 02 Jan 2024 01:26:32 +0000</pubDate>
    </item>
    <item>
      <title>3a05c93b-48bd-4402-a919-8be8001fbc61</title>
      <link>https://db.gcve.eu/sighting/3a05c93b-48bd-4402-a919-8be8001fbc61/export</link>
      <description>{"uuid": "3a05c93b-48bd-4402-a919-8be8001fbc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/cibsecurity/74099", "content": "\u203c\ufe0fCVE-2024-0184\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file admineditteacher.php of the component Add Enginer. The manipulation of the argument FirstnameLastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB249442 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:50.000000Z"}</description>
      <content:encoded>{"uuid": "3a05c93b-48bd-4402-a919-8be8001fbc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/cibsecurity/74099", "content": "\u203c\ufe0fCVE-2024-0184\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file admineditteacher.php of the component Add Enginer. The manipulation of the argument FirstnameLastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB249442 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3a05c93b-48bd-4402-a919-8be8001fbc61/export</guid>
      <pubDate>Tue, 02 Jan 2024 01:31:50 +0000</pubDate>
    </item>
    <item>
      <title>b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7</title>
      <link>https://db.gcve.eu/sighting/b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7/export</link>
      <description>{"uuid": "b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/164637", "content": "https://ift.tt/GLBegWs\nCVE-2024-0184 Exploit", "creation_timestamp": "2024-01-08T21:17:14.000000Z"}</description>
      <content:encoded>{"uuid": "b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/164637", "content": "https://ift.tt/GLBegWs\nCVE-2024-0184 Exploit", "creation_timestamp": "2024-01-08T21:17:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b2d83d96-bd2f-4fbb-838a-5f4b645aa3f7/export</guid>
      <pubDate>Mon, 08 Jan 2024 21:17:14 +0000</pubDate>
    </item>
    <item>
      <title>3c855aac-9080-40f5-bcb1-8c1b77c51c26</title>
      <link>https://db.gcve.eu/sighting/3c855aac-9080-40f5-bcb1-8c1b77c51c26/export</link>
      <description>{"uuid": "3c855aac-9080-40f5-bcb1-8c1b77c51c26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/171160", "content": "https://ift.tt/uomFKUw\nCVE-2024-0184 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Enginer /admin/edit_teacher.php Firstname/Lastname cross site scripting", "creation_timestamp": "2024-01-22T13:41:26.000000Z"}</description>
      <content:encoded>{"uuid": "3c855aac-9080-40f5-bcb1-8c1b77c51c26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/ctinow/171160", "content": "https://ift.tt/uomFKUw\nCVE-2024-0184 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Enginer /admin/edit_teacher.php Firstname/Lastname cross site scripting", "creation_timestamp": "2024-01-22T13:41:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3c855aac-9080-40f5-bcb1-8c1b77c51c26/export</guid>
      <pubDate>Mon, 22 Jan 2024 13:41:26 +0000</pubDate>
    </item>
    <item>
      <title>d00d96df-5bcc-46ae-b6fd-5d77bb772725</title>
      <link>https://db.gcve.eu/sighting/d00d96df-5bcc-46ae-b6fd-5d77bb772725/export</link>
      <description>{"uuid": "d00d96df-5bcc-46ae-b6fd-5d77bb772725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/arpsyndicate/3007", "content": "#ExploitObserverAlert\n\nCVE-2024-0184\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0184. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T17:10:09.000000Z"}</description>
      <content:encoded>{"uuid": "d00d96df-5bcc-46ae-b6fd-5d77bb772725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0184", "type": "seen", "source": "https://t.me/arpsyndicate/3007", "content": "#ExploitObserverAlert\n\nCVE-2024-0184\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0184. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T17:10:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d00d96df-5bcc-46ae-b6fd-5d77bb772725/export</guid>
      <pubDate>Fri, 26 Jan 2024 17:10:09 +0000</pubDate>
    </item>
  </channel>
</rss>
