<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T03:17:14.647450+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export</id>
    <title>ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33</title>
    <updated>2026-05-08T03:17:15.102739+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/162030", "content": "https://ift.tt/tn1Wkz0\nCVE-2024-0192", "creation_timestamp": "2024-01-02T21:26:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea0632e7-6a7e-4e6d-aaa0-bad73caf9d33/export"/>
    <published>2024-01-02T21:26:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export</id>
    <title>30b493b2-a2a0-418f-b24a-7480df1fe574</title>
    <updated>2026-05-08T03:17:15.102601+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30b493b2-a2a0-418f-b24a-7480df1fe574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/cibsecurity/74196", "content": "\u203c\ufe0fCVE-2024-0192\u203c\ufe0f\n\nA vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB249505 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:36:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30b493b2-a2a0-418f-b24a-7480df1fe574/export"/>
    <published>2024-01-03T01:36:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export</id>
    <title>b4303ba0-f03e-47c5-9480-9042c94ad864</title>
    <updated>2026-05-08T03:17:15.102458+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b4303ba0-f03e-47c5-9480-9042c94ad864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/164499", "content": "https://ift.tt/KPZNJx8\nCVE-2024-0192 Exploit", "creation_timestamp": "2024-01-08T17:16:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b4303ba0-f03e-47c5-9480-9042c94ad864/export"/>
    <published>2024-01-08T17:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export</id>
    <title>54c817dd-05fb-43ff-a6c9-13b8084ff8c4</title>
    <updated>2026-05-08T03:17:15.102279+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "54c817dd-05fb-43ff-a6c9-13b8084ff8c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0192", "type": "seen", "source": "https://t.me/ctinow/171342", "content": "https://ift.tt/zYZtWxo\nCVE-2024-0192 | RRJ Nueva Ecija Engineer Online Portal 1.0 Add Downloadable downloadable.php unrestricted upload", "creation_timestamp": "2024-01-22T18:11:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/54c817dd-05fb-43ff-a6c9-13b8084ff8c4/export"/>
    <published>2024-01-22T18:11:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export</id>
    <title>0944ead5-abbe-4fd8-baad-dfc0addd19f7</title>
    <updated>2026-05-08T03:17:15.099727+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0944ead5-abbe-4fd8-baad-dfc0addd19f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0192", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/2985", "content": "#ExploitObserverAlert\n\nCVE-2024-0192\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0192. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-26T15:32:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0944ead5-abbe-4fd8-baad-dfc0addd19f7/export"/>
    <published>2024-01-26T15:32:57+00:00</published>
  </entry>
</feed>
