<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0183 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0183/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sun, 19 Apr 2026 03:29:33 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0183</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0183/#post-666</link>
                        <pubDate>Sat, 12 Oct 2024 02:48:17 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of t...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://mega.nz/file/SB8ylCxQ#vSaXJwbNjeG-KXatgkxE8XI6Cmnv-A_Sg2IjvoJZs0E" target="_blank" rel="noopener">MISC:https://mega.nz/file/SB8ylCxQ#vSaXJwbNjeG-KXatgkxE8XI6Cmnv-A_Sg2IjvoJZs0E</a></li>
<li><a href="https://mega.nz/file/SB8ylCxQ#vSaXJwbNjeG-KXatgkxE8XI6Cmnv-A_Sg2IjvoJZs0E" target="_blank" rel="noopener">URL:https://mega.nz/file/SB8ylCxQ#vSaXJwbNjeG-KXatgkxE8XI6Cmnv-A_Sg2IjvoJZs0E</a></li>
<li><a href="https://vuldb.com/?ctiid.249441" target="_blank" rel="noopener">MISC:https://vuldb.com/?ctiid.249441</a></li>
<li><a href="https://vuldb.com/?ctiid.249441" target="_blank" rel="noopener">URL:https://vuldb.com/?ctiid.249441</a></li>
<li><a href="https://vuldb.com/?id.249441" target="_blank" rel="noopener">MISC:https://vuldb.com/?id.249441</a></li>
<li><a href="https://vuldb.com/?id.249441" target="_blank" rel="noopener">URL:https://vuldb.com/?id.249441</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0183/#post-666</guid>
                    </item>
							        </channel>
        </rss>
		