<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:35:14 +0000</lastBuildDate>
    <item>
      <title>0f1e03db-c57e-4206-ae81-d9325c704b9c</title>
      <link>https://db.gcve.eu/sighting/0f1e03db-c57e-4206-ae81-d9325c704b9c/export</link>
      <description>{"uuid": "0f1e03db-c57e-4206-ae81-d9325c704b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/161442", "content": "https://ift.tt/uGgZM1E\nCVE-2024-0185", "creation_timestamp": "2024-01-02T02:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "0f1e03db-c57e-4206-ae81-d9325c704b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/161442", "content": "https://ift.tt/uGgZM1E\nCVE-2024-0185", "creation_timestamp": "2024-01-02T02:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0f1e03db-c57e-4206-ae81-d9325c704b9c/export</guid>
      <pubDate>Tue, 02 Jan 2024 02:26:45 +0000</pubDate>
    </item>
    <item>
      <title>f136d441-6405-48aa-af43-7afebf65b7a7</title>
      <link>https://db.gcve.eu/sighting/f136d441-6405-48aa-af43-7afebf65b7a7/export</link>
      <description>{"uuid": "f136d441-6405-48aa-af43-7afebf65b7a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/cibsecurity/74120", "content": "\u203c\ufe0fCVE-2024-0185\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboardteacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249443.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:30:37.000000Z"}</description>
      <content:encoded>{"uuid": "f136d441-6405-48aa-af43-7afebf65b7a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/cibsecurity/74120", "content": "\u203c\ufe0fCVE-2024-0185\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboardteacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249443.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:30:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f136d441-6405-48aa-af43-7afebf65b7a7/export</guid>
      <pubDate>Wed, 03 Jan 2024 01:30:37 +0000</pubDate>
    </item>
    <item>
      <title>1cb9ab44-cc6d-4269-a16a-4a8e65b3798f</title>
      <link>https://db.gcve.eu/sighting/1cb9ab44-cc6d-4269-a16a-4a8e65b3798f/export</link>
      <description>{"uuid": "1cb9ab44-cc6d-4269-a16a-4a8e65b3798f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/164636", "content": "https://ift.tt/28Val9U\nCVE-2024-0185 Exploit", "creation_timestamp": "2024-01-08T21:17:12.000000Z"}</description>
      <content:encoded>{"uuid": "1cb9ab44-cc6d-4269-a16a-4a8e65b3798f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/164636", "content": "https://ift.tt/28Val9U\nCVE-2024-0185 Exploit", "creation_timestamp": "2024-01-08T21:17:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1cb9ab44-cc6d-4269-a16a-4a8e65b3798f/export</guid>
      <pubDate>Mon, 08 Jan 2024 21:17:12 +0000</pubDate>
    </item>
    <item>
      <title>2d89b127-34cf-4aa0-bc25-e3cabadea404</title>
      <link>https://db.gcve.eu/sighting/2d89b127-34cf-4aa0-bc25-e3cabadea404/export</link>
      <description>{"uuid": "2d89b127-34cf-4aa0-bc25-e3cabadea404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/171161", "content": "https://ift.tt/raF5VDO\nCVE-2024-0185 | RRJ Nueva Ecija Engineer Online Portal 1.0 Avatar dasboard_teacher.php unrestricted upload", "creation_timestamp": "2024-01-22T13:41:28.000000Z"}</description>
      <content:encoded>{"uuid": "2d89b127-34cf-4aa0-bc25-e3cabadea404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/ctinow/171161", "content": "https://ift.tt/raF5VDO\nCVE-2024-0185 | RRJ Nueva Ecija Engineer Online Portal 1.0 Avatar dasboard_teacher.php unrestricted upload", "creation_timestamp": "2024-01-22T13:41:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2d89b127-34cf-4aa0-bc25-e3cabadea404/export</guid>
      <pubDate>Mon, 22 Jan 2024 13:41:28 +0000</pubDate>
    </item>
    <item>
      <title>9cab636a-4706-4650-aa80-6d3e373b0231</title>
      <link>https://db.gcve.eu/sighting/9cab636a-4706-4650-aa80-6d3e373b0231/export</link>
      <description>{"uuid": "9cab636a-4706-4650-aa80-6d3e373b0231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/arpsyndicate/3101", "content": "#ExploitObserverAlert\n\nCVE-2024-0185\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0185. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.\n\nFIRST-EPSS: 0.000610000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-26T22:38:31.000000Z"}</description>
      <content:encoded>{"uuid": "9cab636a-4706-4650-aa80-6d3e373b0231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0185", "type": "seen", "source": "https://t.me/arpsyndicate/3101", "content": "#ExploitObserverAlert\n\nCVE-2024-0185\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0185. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.\n\nFIRST-EPSS: 0.000610000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-26T22:38:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9cab636a-4706-4650-aa80-6d3e373b0231/export</guid>
      <pubDate>Fri, 26 Jan 2024 22:38:31 +0000</pubDate>
    </item>
  </channel>
</rss>
