{"vulnerability": "CVE-2024-7102", "sightings": [{"uuid": "be0a812a-6ca8-4951-aa3a-a63fe21db17b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li37ptqgzw22", "content": "", "creation_timestamp": "2025-02-13T17:30:56.367891Z"}, {"uuid": "13c332ab-d3a7-48ac-86dd-352bdbd2c7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li3vie4k7j2c", "content": "", "creation_timestamp": "2025-02-14T00:00:27.539372Z"}, {"uuid": "30de5568-adbb-4d7a-9a0e-7f6f0460d873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "daabefe3-dc6c-4eb7-bf28-f23c8b185912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li2ypalsun2n", "content": "", "creation_timestamp": "2025-02-13T15:25:26.035772Z"}, {"uuid": "73edecdc-2e1d-4891-8fc3-7d1be5dd67fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhzjaojbha2x", "content": "", "creation_timestamp": "2025-02-13T01:16:05.412405Z"}, {"uuid": "40c38653-bb88-44b1-b960-cf6663ce7835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113994296216432932", "content": "", "creation_timestamp": "2025-02-13T02:48:41.163863Z"}, {"uuid": "16a1e036-81c4-40fd-a34a-664728a84c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhztsqct7n2v", "content": "", "creation_timestamp": "2025-02-13T04:25:08.686729Z"}, {"uuid": "76d5a3fd-5ba6-4cdd-b835-4c9c37febc50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7102", "type": "seen", "source": "https://t.me/cvedetector/17961", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7102 - GitLab CE/EE Pipeline Misuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7102 \nPublished : Feb. 13, 2025, 1:15 a.m. | 2\u00a0hours, 8\u00a0minutes ago \nDescription : An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.0 which allows an attacker to trigger a pipeline as another user under certain circumstances. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T04:37:02.000000Z"}]}