<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:52:17 +0000</lastBuildDate>
    <item>
      <title>b1d9c80e-c555-4ae5-9dd1-ffe3bcfb5b42</title>
      <link>https://db.gcve.eu/sighting/b1d9c80e-c555-4ae5-9dd1-ffe3bcfb5b42/export</link>
      <description>{"uuid": "b1d9c80e-c555-4ae5-9dd1-ffe3bcfb5b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52480", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19475", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52480\n\ud83d\udd25 CVSS Score: 8.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities), an argument injection is possible in the `gettreesha()` function. This can then lead to a potential remote code execution. Users should upgrade immediately to v1.9.5 to receive a patch. All prior versions are vulnerable. No known workarounds are available.\n\ud83d\udccf Published: 2025-06-25T16:37:32.944Z\n\ud83d\udccf Modified: 2025-06-25T16:37:32.944Z\n\ud83d\udd17 References:\n1. https://github.com/JuliaRegistries/Registrator.jl/security/advisories/GHSA-w8jv-rg3h-fc68\n2. https://github.com/JuliaRegistries/Registrator.jl/pull/449", "creation_timestamp": "2025-06-25T16:47:30.000000Z"}</description>
      <content:encoded>{"uuid": "b1d9c80e-c555-4ae5-9dd1-ffe3bcfb5b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-52480", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19475", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-52480\n\ud83d\udd25 CVSS Score: 8.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Registrator is a GitHub app that automates creation of registration pull requests for julia packages to the General registry. Prior to version 1.9.5, if the clone URL returned by GitHub is malicious (or can be injected using upstream vulnerabilities), an argument injection is possible in the `gettreesha()` function. This can then lead to a potential remote code execution. Users should upgrade immediately to v1.9.5 to receive a patch. All prior versions are vulnerable. No known workarounds are available.\n\ud83d\udccf Published: 2025-06-25T16:37:32.944Z\n\ud83d\udccf Modified: 2025-06-25T16:37:32.944Z\n\ud83d\udd17 References:\n1. https://github.com/JuliaRegistries/Registrator.jl/security/advisories/GHSA-w8jv-rg3h-fc68\n2. https://github.com/JuliaRegistries/Registrator.jl/pull/449", "creation_timestamp": "2025-06-25T16:47:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b1d9c80e-c555-4ae5-9dd1-ffe3bcfb5b42/export</guid>
      <pubDate>Wed, 25 Jun 2025 16:47:30 +0000</pubDate>
    </item>
  </channel>
</rss>
