<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0192 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0192/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Tue, 21 Apr 2026 14:55:12 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0192</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0192/#post-698</link>
                        <pubDate>Tue, 22 Oct 2024 18:30:08 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://mega.nz/file/2RNnjDTR#nDT4E74juKhdO3eWTv8VjDD2dDcNUzyAk2UR3psM8rM" target="_blank" rel="noopener">MISC:https://mega.nz/file/2RNnjDTR#nDT4E74juKhdO3eWTv8VjDD2dDcNUzyAk2UR3psM8rM</a></li>
<li><a href="https://mega.nz/file/2RNnjDTR#nDT4E74juKhdO3eWTv8VjDD2dDcNUzyAk2UR3psM8rM" target="_blank" rel="noopener">URL:https://mega.nz/file/2RNnjDTR#nDT4E74juKhdO3eWTv8VjDD2dDcNUzyAk2UR3psM8rM</a></li>
<li><a href="https://vuldb.com/?ctiid.249505" target="_blank" rel="noopener">MISC:https://vuldb.com/?ctiid.249505</a></li>
<li><a href="https://vuldb.com/?ctiid.249505" target="_blank" rel="noopener">URL:https://vuldb.com/?ctiid.249505</a></li>
<li><a href="https://vuldb.com/?id.249505" target="_blank" rel="noopener">MISC:https://vuldb.com/?id.249505</a></li>
<li><a href="https://vuldb.com/?id.249505" target="_blank" rel="noopener">URL:https://vuldb.com/?id.249505</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>worldlovely</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0192/#post-698</guid>
                    </item>
							        </channel>
        </rss>
		