<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 17:34:11 +0000</lastBuildDate>
    <item>
      <title>5eab0b4f-3645-4607-a2fd-be49570e92e5</title>
      <link>https://db.gcve.eu/sighting/5eab0b4f-3645-4607-a2fd-be49570e92e5/export</link>
      <description>{"uuid": "5eab0b4f-3645-4607-a2fd-be49570e92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-v34r-vj4r-38j6", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884373877761645", "content": "", "creation_timestamp": "2025-01-24T16:53:59.633615Z"}</description>
      <content:encoded>{"uuid": "5eab0b4f-3645-4607-a2fd-be49570e92e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-v34r-vj4r-38j6", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884373877761645", "content": "", "creation_timestamp": "2025-01-24T16:53:59.633615Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5eab0b4f-3645-4607-a2fd-be49570e92e5/export</guid>
      <pubDate>Fri, 24 Jan 2025 16:53:59 +0000</pubDate>
    </item>
    <item>
      <title>5725216f-8efd-4afb-a51d-65c9fa93b5b8</title>
      <link>https://db.gcve.eu/sighting/5725216f-8efd-4afb-a51d-65c9fa93b5b8/export</link>
      <description>{"uuid": "5725216f-8efd-4afb-a51d-65c9fa93b5b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-V34R-VJ4R-38J6", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24355\n\ud83d\udd39 Description: Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.\n\ud83d\udccf Published: 2025-01-24T16:48:17.723Z\n\ud83d\udccf Modified: 2025-01-24T16:48:17.723Z\n\ud83d\udd17 References:\n1. https://github.com/updatecli/updatecli/security/advisories/GHSA-v34r-vj4r-38j6\n2. https://github.com/updatecli/updatecli/commit/344b28091ffeca5ed32e8d0f9eda542842fcd3fa", "creation_timestamp": "2025-01-24T17:04:50.000000Z"}</description>
      <content:encoded>{"uuid": "5725216f-8efd-4afb-a51d-65c9fa93b5b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-V34R-VJ4R-38J6", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24355\n\ud83d\udd39 Description: Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.\n\ud83d\udccf Published: 2025-01-24T16:48:17.723Z\n\ud83d\udccf Modified: 2025-01-24T16:48:17.723Z\n\ud83d\udd17 References:\n1. https://github.com/updatecli/updatecli/security/advisories/GHSA-v34r-vj4r-38j6\n2. https://github.com/updatecli/updatecli/commit/344b28091ffeca5ed32e8d0f9eda542842fcd3fa", "creation_timestamp": "2025-01-24T17:04:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5725216f-8efd-4afb-a51d-65c9fa93b5b8/export</guid>
      <pubDate>Fri, 24 Jan 2025 17:04:50 +0000</pubDate>
    </item>
  </channel>
</rss>
