<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0185 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0185/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sun, 19 Apr 2026 05:04:31 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0185</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0185/#post-691</link>
                        <pubDate>Tue, 22 Oct 2024 18:23:45 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.p...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE" target="_blank" rel="noopener">MISC:https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE</a></li>
<li><a href="https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE" target="_blank" rel="noopener">URL:https://mega.nz/file/PBd13AoR#G3fYWB82wGCa7sD22JP3_twtbw3B0qSJ-4eMMrYR5cE</a></li>
<li><a href="https://vuldb.com/?ctiid.249443" target="_blank" rel="noopener">MISC:https://vuldb.com/?ctiid.249443</a></li>
<li><a href="https://vuldb.com/?ctiid.249443" target="_blank" rel="noopener">URL:https://vuldb.com/?ctiid.249443</a></li>
<li><a href="https://vuldb.com/?id.249443" target="_blank" rel="noopener">MISC:https://vuldb.com/?id.249443</a></li>
<li><a href="https://vuldb.com/?id.249443" target="_blank" rel="noopener">URL:https://vuldb.com/?id.249443</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>worldlovely</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0185/#post-691</guid>
                    </item>
							        </channel>
        </rss>
		