<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:35:13 +0000</lastBuildDate>
    <item>
      <title>ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33</title>
      <link>https://db.gcve.eu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export</link>
      <description>{"uuid": "ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/162030", "content": "https://ift.tt/tn1Wkz0\nCVE-2024-0192", "creation_timestamp": "2024-01-02T21:26:23.000000Z"}</description>
      <content:encoded>{"uuid": "ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/162030", "content": "https://ift.tt/tn1Wkz0\nCVE-2024-0192", "creation_timestamp": "2024-01-02T21:26:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export</guid>
      <pubDate>Tue, 02 Jan 2024 21:26:23 +0000</pubDate>
    </item>
    <item>
      <title>30b493b2-a2a0-418f-b24a-7480df1fe574</title>
      <link>https://db.gcve.eu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export</link>
      <description>{"uuid": "30b493b2-a2a0-418f-b24a-7480df1fe574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/cibsecurity/74196", "content": "\u203c\ufe0fCVE-2024-0192\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249505 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:36:53.000000Z"}</description>
      <content:encoded>{"uuid": "30b493b2-a2a0-418f-b24a-7480df1fe574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/cibsecurity/74196", "content": "\u203c\ufe0fCVE-2024-0192\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249505 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:36:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export</guid>
      <pubDate>Wed, 03 Jan 2024 01:36:53 +0000</pubDate>
    </item>
    <item>
      <title>b4303ba0-f03e-47c5-9480-9042c94ad864</title>
      <link>https://db.gcve.eu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export</link>
      <description>{"uuid": "b4303ba0-f03e-47c5-9480-9042c94ad864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/164499", "content": "https://ift.tt/KPZNJx8\nCVE-2024-0192 Exploit", "creation_timestamp": "2024-01-08T17:16:31.000000Z"}</description>
      <content:encoded>{"uuid": "b4303ba0-f03e-47c5-9480-9042c94ad864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/164499", "content": "https://ift.tt/KPZNJx8\nCVE-2024-0192 Exploit", "creation_timestamp": "2024-01-08T17:16:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export</guid>
      <pubDate>Mon, 08 Jan 2024 17:16:31 +0000</pubDate>
    </item>
    <item>
      <title>54c817dd-05fb-43ff-a6c9-13b8084ff8c4</title>
      <link>https://db.gcve.eu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export</link>
      <description>{"uuid": "54c817dd-05fb-43ff-a6c9-13b8084ff8c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/171342", "content": "https://ift.tt/zYZtWxo\nCVE-2024-0192 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Downloadable downloadable.php unrestricted upload", "creation_timestamp": "2024-01-22T18:11:33.000000Z"}</description>
      <content:encoded>{"uuid": "54c817dd-05fb-43ff-a6c9-13b8084ff8c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/171342", "content": "https://ift.tt/zYZtWxo\nCVE-2024-0192 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Downloadable downloadable.php unrestricted upload", "creation_timestamp": "2024-01-22T18:11:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export</guid>
      <pubDate>Mon, 22 Jan 2024 18:11:33 +0000</pubDate>
    </item>
    <item>
      <title>0944ead5-abbe-4fd8-baad-dfc0addd19f7</title>
      <link>https://db.gcve.eu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export</link>
      <description>{"uuid": "0944ead5-abbe-4fd8-baad-dfc0addd19f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2985", "content": "#ExploitObserverAlert\n\nCVE-2024-0192\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0192. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-26T15:32:57.000000Z"}</description>
      <content:encoded>{"uuid": "0944ead5-abbe-4fd8-baad-dfc0addd19f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0192", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2985", "content": "#ExploitObserverAlert\n\nCVE-2024-0192\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0192. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-26T15:32:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export</guid>
      <pubDate>Fri, 26 Jan 2024 15:32:57 +0000</pubDate>
    </item>
  </channel>
</rss>
