<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:35:14 +0000</lastBuildDate>
    <item>
      <title>67777e15-85fd-4aac-82f0-808a2f4b665d</title>
      <link>https://db.gcve.eu/sighting/67777e15-85fd-4aac-82f0-808a2f4b665d/export</link>
      <description>{"uuid": "67777e15-85fd-4aac-82f0-808a2f4b665d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/161431", "content": "https://ift.tt/vqAljrT\nCVE-2024-0183", "creation_timestamp": "2024-01-02T00:26:07.000000Z"}</description>
      <content:encoded>{"uuid": "67777e15-85fd-4aac-82f0-808a2f4b665d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/161431", "content": "https://ift.tt/vqAljrT\nCVE-2024-0183", "creation_timestamp": "2024-01-02T00:26:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/67777e15-85fd-4aac-82f0-808a2f4b665d/export</guid>
      <pubDate>Tue, 02 Jan 2024 00:26:07 +0000</pubDate>
    </item>
    <item>
      <title>a344b456-7e36-40a4-a69e-3926b51608ec</title>
      <link>https://db.gcve.eu/sighting/a344b456-7e36-40a4-a69e-3926b51608ec/export</link>
      <description>{"uuid": "a344b456-7e36-40a4-a69e-3926b51608ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/cibsecurity/74098", "content": "\u203c\ufe0fCVE-2024-0183\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file adminstudents.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249441 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:45.000000Z"}</description>
      <content:encoded>{"uuid": "a344b456-7e36-40a4-a69e-3926b51608ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/cibsecurity/74098", "content": "\u203c\ufe0fCVE-2024-0183\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file adminstudents.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249441 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-02T01:31:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a344b456-7e36-40a4-a69e-3926b51608ec/export</guid>
      <pubDate>Tue, 02 Jan 2024 01:31:45 +0000</pubDate>
    </item>
    <item>
      <title>2d4e33ee-5ed7-4de4-a16b-e666f7aa6102</title>
      <link>https://db.gcve.eu/sighting/2d4e33ee-5ed7-4de4-a16b-e666f7aa6102/export</link>
      <description>{"uuid": "2d4e33ee-5ed7-4de4-a16b-e666f7aa6102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/164638", "content": "https://ift.tt/wdUYy46\nCVE-2024-0183 Exploit", "creation_timestamp": "2024-01-08T21:17:15.000000Z"}</description>
      <content:encoded>{"uuid": "2d4e33ee-5ed7-4de4-a16b-e666f7aa6102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/164638", "content": "https://ift.tt/wdUYy46\nCVE-2024-0183 Exploit", "creation_timestamp": "2024-01-08T21:17:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2d4e33ee-5ed7-4de4-a16b-e666f7aa6102/export</guid>
      <pubDate>Mon, 08 Jan 2024 21:17:15 +0000</pubDate>
    </item>
    <item>
      <title>9cd61828-10f0-408f-aeeb-0648222b9a30</title>
      <link>https://db.gcve.eu/sighting/9cd61828-10f0-408f-aeeb-0648222b9a30/export</link>
      <description>{"uuid": "9cd61828-10f0-408f-aeeb-0648222b9a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/171159", "content": "https://ift.tt/LbocMWy\nCVE-2024-0183 | RRJ Nueva Ecija Engineer Online Portal 1.0 NIA Office /admin/students.php cross site scripting", "creation_timestamp": "2024-01-22T13:41:25.000000Z"}</description>
      <content:encoded>{"uuid": "9cd61828-10f0-408f-aeeb-0648222b9a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/ctinow/171159", "content": "https://ift.tt/LbocMWy\nCVE-2024-0183 | RRJ Nueva Ecija Engineer Online Portal 1.0 NIA Office /admin/students.php cross site scripting", "creation_timestamp": "2024-01-22T13:41:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9cd61828-10f0-408f-aeeb-0648222b9a30/export</guid>
      <pubDate>Mon, 22 Jan 2024 13:41:25 +0000</pubDate>
    </item>
    <item>
      <title>67e4a9f6-439f-4bc8-9ebd-e09334db36ae</title>
      <link>https://db.gcve.eu/sighting/67e4a9f6-439f-4bc8-9ebd-e09334db36ae/export</link>
      <description>{"uuid": "67e4a9f6-439f-4bc8-9ebd-e09334db36ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/arpsyndicate/3017", "content": "#ExploitObserverAlert\n\nCVE-2024-0183\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0183. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T17:38:56.000000Z"}</description>
      <content:encoded>{"uuid": "67e4a9f6-439f-4bc8-9ebd-e09334db36ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0183", "type": "seen", "source": "https://t.me/arpsyndicate/3017", "content": "#ExploitObserverAlert\n\nCVE-2024-0183\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0183. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-26T17:38:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/67e4a9f6-439f-4bc8-9ebd-e09334db36ae/export</guid>
      <pubDate>Fri, 26 Jan 2024 17:38:56 +0000</pubDate>
    </item>
  </channel>
</rss>
