{"vulnerability": "cve-2020-2641", "sightings": [{"uuid": "bf54db82-d0b4-449f-b66a-3a67cd9d7e3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26414", "type": "seen", "source": "https://t.me/cibsecurity/22215", "content": "\u203c CVE-2020-26414 \u203c\n\nAn issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-15T18:51:11.000000Z"}, {"uuid": "1e6da229-d7dd-476e-a420-cfc2c60907a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20573", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:45.000000Z"}, {"uuid": "99895e17-9752-46d2-84ce-24462c187334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20628", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:11.000000Z"}, {"uuid": "c2f99882-c61b-42a4-b1e1-82d78b23e183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20553", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:51.000000Z"}, {"uuid": "f64b3392-58e1-4ab2-9af3-9090a7cabb77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20549", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:44.000000Z"}, {"uuid": "1aacfa36-5dfc-4a76-bdc8-9e2e4a883328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20516", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:16.000000Z"}, {"uuid": "d756e962-01ad-4bd4-9abb-4581524577b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20155", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:11:08.000000Z"}, {"uuid": "f22badd0-bc15-4a86-90c4-5f9a44cebc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20193", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:25:16.000000Z"}, {"uuid": "ec501bae-18c8-49bc-9acb-f8fbc491fa87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20232", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:34:22.000000Z"}, {"uuid": "19317a26-b08a-4f1d-b19f-07ee28b27a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20592", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:03.000000Z"}, {"uuid": "8038619b-1356-48a1-813c-99faf355efa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19837", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T09:25:27.000000Z"}, {"uuid": "bb68612e-346b-47c7-90d4-195822416a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20500", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:29.000000Z"}, {"uuid": "22e5b18b-bcce-4c89-8387-f6eb18fdc5f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20135", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:04:59.000000Z"}, {"uuid": "49eeb76e-9c18-49d6-b790-cab9536db6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20481", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:57.000000Z"}, {"uuid": "f7e89f83-07a8-4a80-a83c-ec680744ff96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20477", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:51.000000Z"}, {"uuid": "3d868043-7bf3-4d99-86ab-34fa2d31ddd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19944", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T13:25:32.000000Z"}, {"uuid": "b138729a-b854-4669-bf16-6bc125976561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19936", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T13:25:18.000000Z"}, {"uuid": "c0430451-cdd0-4baf-807f-495dbc64be34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19981", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:35:25.000000Z"}, {"uuid": "224ed750-0547-4257-9668-64255aacc40f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19973", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:35:16.000000Z"}, {"uuid": "fdd25866-73fb-47f3-9c8a-2e3418f92b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19964", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:25:40.000000Z"}, {"uuid": "27d6efeb-7e43-4c3d-ba90-611c29e30c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19956", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:25:28.000000Z"}, {"uuid": "e385c7cb-1db4-49c7-a111-3da3f01610ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19924", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:35:22.000000Z"}, {"uuid": "55daca93-8ac3-4782-a413-8434d46c0570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19785", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:35:24.000000Z"}, {"uuid": "e078f2e0-8002-442d-a25b-c4b85a68a317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19916", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:35:13.000000Z"}, {"uuid": "e8ca0180-fa1d-489f-9cf1-c6d5494e7f07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19857", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T10:25:31.000000Z"}, {"uuid": "de60aea2-bc38-453b-aa2e-b8bf8627fbf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19897", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:25:20.000000Z"}, {"uuid": "c5811681-32bc-443b-8f17-d6f1740aba19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19885", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T11:25:37.000000Z"}, {"uuid": "013c7f23-413c-4e97-b57a-6c0af1f10a30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19877", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T11:25:27.000000Z"}, {"uuid": "2db17796-4b81-44f4-b4c4-c79842bd9857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19865", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T10:25:41.000000Z"}, {"uuid": "c4d2c97d-f090-4582-b7fb-4e9faa03009c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19845", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T09:25:37.000000Z"}, {"uuid": "57348380-b5cf-4716-bcd7-4e3b3111a569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19817", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T08:25:32.000000Z"}, {"uuid": "c4ecd65b-575f-4a0b-b48c-7ea80e0034f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19825", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T08:25:42.000000Z"}, {"uuid": "e93042ca-1298-43c1-8e75-88d78fe575df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19777", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:35:16.000000Z"}, {"uuid": "7ea60d40-c5b5-4ba4-95c6-9cd425bbddda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19805", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:38:23.000000Z"}, {"uuid": "835f5bfe-32b4-4928-8317-47ec38c0ad79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19797", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T07:38:15.000000Z"}, {"uuid": "7917adc5-588c-4d2c-b63c-6d68400737ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20213", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:31:23.000000Z"}, {"uuid": "32f68409-bc9e-45a5-b742-1aff8464c8b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20632", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:16.000000Z"}, {"uuid": "9b27b539-7443-44c9-9113-6abde5153517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20569", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:38.000000Z"}, {"uuid": "bf0896a1-70d5-440e-a16d-82c0e91d7bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20588", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:04:56.000000Z"}, {"uuid": "cc5918bf-d934-40c5-bc9c-a8ae4b50e585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20496", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:25.000000Z"}, {"uuid": "49f28f0c-d9b1-4cb5-b19c-dace6eb2e729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20540", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:22.000000Z"}, {"uuid": "7b198e8b-fb42-47f3-9210-88983a0f43c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20536", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:18.000000Z"}, {"uuid": "2641b511-0e9d-44ae-a8f2-6693c7974caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20612", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:11.000000Z"}, {"uuid": "2ddcdab1-9863-400a-9451-e23621c41ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26418", "type": "seen", "source": "https://t.me/cibsecurity/20608", "content": "\u203c CVE-2020-26418 \u203c\n\nMemory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:06.000000Z"}, {"uuid": "33991790-f9f6-4178-8424-7d5507e2ad72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26419", "type": "seen", "source": "https://t.me/cibsecurity/20520", "content": "\u203c CVE-2020-26419 \u203c\n\nMemory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:23.000000Z"}, {"uuid": "542443cd-bedd-45bd-ba45-841c998a782f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20032", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:15:49.000000Z"}, {"uuid": "1b97969f-ed20-4665-b4a2-0239bee223a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20089", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:35:16.000000Z"}, {"uuid": "067faab9-f9b4-4a45-a4d0-f8b22579d987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20147", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:10:56.000000Z"}, {"uuid": "62569a5f-52f0-4632-8e77-b86845107146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20117", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T17:25:25.000000Z"}, {"uuid": "ca509895-29c9-4447-8d58-e8281237c9ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20059", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:24:19.000000Z"}, {"uuid": "71c470bf-e53c-48fa-829e-7ad59fc6dcb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20097", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:35:30.000000Z"}, {"uuid": "c2d1d459-8143-4834-a127-0da4482af580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/19905", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T12:25:30.000000Z"}, {"uuid": "70b5cf21-7d59-4761-a6f8-f40895a7e7a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20079", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:25:27.000000Z"}, {"uuid": "0c692203-c920-493c-a3e2-eba5e856456d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/19993", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:41:24.000000Z"}, {"uuid": "05ce199f-3e47-4c88-b298-10d100a2b670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20040", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:15:59.000000Z"}, {"uuid": "043471ce-8f00-4a5a-a4cc-01f8808c07f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20173", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:24:18.000000Z"}, {"uuid": "49269cfe-fe62-46f9-ae11-7a88f88b9ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20013", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T15:25:12.000000Z"}, {"uuid": "c94947be-bd4d-4d9b-b425-3b07c6ff2dbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20127", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T18:04:48.000000Z"}, {"uuid": "09078e89-d151-449b-bdc0-110700f3d214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20109", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T17:25:13.000000Z"}, {"uuid": "0ba18327-db3a-49b1-9749-c85673f7d671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20071", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:25:19.000000Z"}, {"uuid": "59b2307d-43cb-4e78-8901-777a95734b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26416", "type": "seen", "source": "https://t.me/cibsecurity/20051", "content": "\u203c CVE-2020-26416 \u203c\n\nInformation disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions &gt;=8.4 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T16:24:07.000000Z"}, {"uuid": "f44aa308-da8a-437c-87a1-096a0cd1621f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20001", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T14:41:36.000000Z"}, {"uuid": "6a6fa6bf-9b09-47d3-ac5d-4bac84e8e77f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26415", "type": "seen", "source": "https://t.me/cibsecurity/20021", "content": "\u203c CVE-2020-26415 \u203c\n\nInformation about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab &gt;=12.2 to &lt;13.4.7, &gt;=13.5 to &lt;13.5.5, and &gt;=13.6 to &lt;13.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T15:25:24.000000Z"}]}