<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:29:33 +0000</lastBuildDate>
    <item>
      <title>81489189-54f6-4c50-8288-ac08d33d48b3</title>
      <link>https://db.gcve.eu/sighting/81489189-54f6-4c50-8288-ac08d33d48b3/export</link>
      <description>{"uuid": "81489189-54f6-4c50-8288-ac08d33d48b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/161867", "content": "https://ift.tt/mb6fHnp\nCVE-2024-0188", "creation_timestamp": "2024-01-02T16:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "81489189-54f6-4c50-8288-ac08d33d48b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/161867", "content": "https://ift.tt/mb6fHnp\nCVE-2024-0188", "creation_timestamp": "2024-01-02T16:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/81489189-54f6-4c50-8288-ac08d33d48b3/export</guid>
      <pubDate>Tue, 02 Jan 2024 16:26:27 +0000</pubDate>
    </item>
    <item>
      <title>d764ea8b-8030-4fb4-88ff-55a9a795830b</title>
      <link>https://db.gcve.eu/sighting/d764ea8b-8030-4fb4-88ff-55a9a795830b/export</link>
      <description>{"uuid": "d764ea8b-8030-4fb4-88ff-55a9a795830b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/cibsecurity/74183", "content": "\u203c\ufe0fCVE-2024-0188\u203c\ufe0f\n\nA vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file changepasswordteacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB249501 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:35:49.000000Z"}</description>
      <content:encoded>{"uuid": "d764ea8b-8030-4fb4-88ff-55a9a795830b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/cibsecurity/74183", "content": "\u203c\ufe0fCVE-2024-0188\u203c\ufe0f\n\nA vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file changepasswordteacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB249501 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:35:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d764ea8b-8030-4fb4-88ff-55a9a795830b/export</guid>
      <pubDate>Wed, 03 Jan 2024 01:35:49 +0000</pubDate>
    </item>
    <item>
      <title>6cc3b973-feee-45ad-b1f9-0d75500e22ae</title>
      <link>https://db.gcve.eu/sighting/6cc3b973-feee-45ad-b1f9-0d75500e22ae/export</link>
      <description>{"uuid": "6cc3b973-feee-45ad-b1f9-0d75500e22ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/165241", "content": "https://ift.tt/xdtI6FP\nCVE-2024-0188 Exploit", "creation_timestamp": "2024-01-09T19:16:23.000000Z"}</description>
      <content:encoded>{"uuid": "6cc3b973-feee-45ad-b1f9-0d75500e22ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/165241", "content": "https://ift.tt/xdtI6FP\nCVE-2024-0188 Exploit", "creation_timestamp": "2024-01-09T19:16:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6cc3b973-feee-45ad-b1f9-0d75500e22ae/export</guid>
      <pubDate>Tue, 09 Jan 2024 19:16:23 +0000</pubDate>
    </item>
    <item>
      <title>90de3bc0-3937-409b-a3aa-1c17c9c53a90</title>
      <link>https://db.gcve.eu/sighting/90de3bc0-3937-409b-a3aa-1c17c9c53a90/export</link>
      <description>{"uuid": "90de3bc0-3937-409b-a3aa-1c17c9c53a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/171304", "content": "https://ift.tt/hMuWxkd\nCVE-2024-0188 | RRJ Nueva Ecija Engineer Online Portal 1.0 change_password_teacher.php weak password", "creation_timestamp": "2024-01-22T17:16:14.000000Z"}</description>
      <content:encoded>{"uuid": "90de3bc0-3937-409b-a3aa-1c17c9c53a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/ctinow/171304", "content": "https://ift.tt/hMuWxkd\nCVE-2024-0188 | RRJ Nueva Ecija Engineer Online Portal 1.0 change_password_teacher.php weak password", "creation_timestamp": "2024-01-22T17:16:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/90de3bc0-3937-409b-a3aa-1c17c9c53a90/export</guid>
      <pubDate>Mon, 22 Jan 2024 17:16:14 +0000</pubDate>
    </item>
    <item>
      <title>39d50e51-ddf1-4f9e-bed5-1327c24b7cfd</title>
      <link>https://db.gcve.eu/sighting/39d50e51-ddf1-4f9e-bed5-1327c24b7cfd/export</link>
      <description>{"uuid": "39d50e51-ddf1-4f9e-bed5-1327c24b7cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/arpsyndicate/3025", "content": "#ExploitObserverAlert\n\nCVE-2024-0188\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0188. A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file change_password_teacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-249501 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-01-26T18:03:38.000000Z"}</description>
      <content:encoded>{"uuid": "39d50e51-ddf1-4f9e-bed5-1327c24b7cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0188", "type": "seen", "source": "https://t.me/arpsyndicate/3025", "content": "#ExploitObserverAlert\n\nCVE-2024-0188\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0188. A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file change_password_teacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-249501 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-01-26T18:03:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/39d50e51-ddf1-4f9e-bed5-1327c24b7cfd/export</guid>
      <pubDate>Fri, 26 Jan 2024 18:03:38 +0000</pubDate>
    </item>
  </channel>
</rss>
