{"vulnerability": "cve-2020-26409", "sightings": [{"uuid": "d368fd37-802a-4e3a-94bc-e31c1ce2fd09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20229", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:34:19.000000Z"}, {"uuid": "c6fa7fd2-ef10-42e7-ad9e-6b38ff932aea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20152", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:11:04.000000Z"}, {"uuid": "6c481291-7743-4946-9745-1956aa4882a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20094", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:35:24.000000Z"}, {"uuid": "6fc61b50-b707-415c-b8a1-5798c8fba272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20210", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:31:17.000000Z"}, {"uuid": "da792bdb-fa8c-47c4-9dea-942327d9ee34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20037", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:15:56.000000Z"}, {"uuid": "58538551-69f4-400e-9076-959aa9edbb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19998", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:41:31.000000Z"}, {"uuid": "e0feba95-37db-4141-810e-05b2210654df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20114", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T17:25:21.000000Z"}, {"uuid": "9fd69369-af88-4c46-a91c-808866daebf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20076", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:25:24.000000Z"}, {"uuid": "20a06c0b-7463-4ae4-b364-cbfb96b1760b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20056", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:24:12.000000Z"}, {"uuid": "44ee14f6-6f34-473e-8676-71a4b8977262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19902", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:25:27.000000Z"}, {"uuid": "ca02dbbd-0cb4-4561-8c5b-3ba6828c12e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20170", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:24:12.000000Z"}, {"uuid": "8bbe429f-ceeb-4cb3-8f62-b31c799bcd90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20132", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:04:56.000000Z"}, {"uuid": "b4a01b16-dfdd-4968-b9d9-ff583703f5e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20018", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T15:25:20.000000Z"}, {"uuid": "ad4637d3-c0ae-4fa6-a7eb-6939e8690fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/20190", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:25:12.000000Z"}, {"uuid": "512fb62d-0987-4a9b-b6ec-4f0700fb1d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19941", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T13:25:26.000000Z"}, {"uuid": "f3f75c0a-2e45-4794-b5c9-f1604e1d9421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19978", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:35:21.000000Z"}, {"uuid": "1789a484-af84-4caf-ba23-94ea7ffddcbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19961", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:25:35.000000Z"}, {"uuid": "f5362e3a-9056-43f4-a1db-f3c114a8ae17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19782", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:35:21.000000Z"}, {"uuid": "32b88641-6210-41d7-9a6e-84cfe5797ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19921", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:35:18.000000Z"}, {"uuid": "76b3587e-4917-4e41-8c38-6b3cda177aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19882", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T11:25:34.000000Z"}, {"uuid": "dbf82176-75b7-42e2-8c7c-0b38152f17f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19862", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T10:25:39.000000Z"}, {"uuid": "3154924c-4e2a-4349-9936-6daa8e24a1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19842", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T09:25:34.000000Z"}, {"uuid": "7dea5298-2d24-4af6-866e-61a2066fd5f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19822", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T08:25:39.000000Z"}, {"uuid": "9bb0bbb7-cec8-4e84-a696-12078b8575b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26409", "type": "seen", "source": "https://t.me/cibsecurity/19802", "content": "\u203c CVE-2020-26409 \u203c\n\nA DOS vulnerability exists in Gitlab CE/EE &gt;=10.3, &lt;13.4.7,&gt;=13.5, &lt;13.5.5,&gt;=13.6, &lt;13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:38:20.000000Z"}]}