{"vulnerability": "CVE-2024-9164", "sightings": [{"uuid": "df0a62e6-3b0b-4590-b6df-39b63127ceee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-9164", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:21:55.427876Z"}, {"uuid": "11bd8d8d-b43d-4c0d-9c9e-72d198426c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-9164", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:27:00.546493Z"}, {"uuid": "ca38c2cf-68da-4c17-b132-dcdeab6b70bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-9164", "type": "confirmed", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:27:03.013098Z"}, {"uuid": "43730ffe-d921-46c0-97e1-8ff91bc1fe6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2024-9164", "type": "patched", "source": null, "content": "", "creation_timestamp": "2024-10-21T13:27:03.231819Z"}, {"uuid": "abdd221a-859c-4ee1-9a2e-45f385f79eeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-9164", "type": "seen", "source": "https://infosec.exchange/@adulau/113288712281405586", "content": "", "creation_timestamp": "2024-10-11T12:09:23.000000Z"}, {"uuid": "ea6e9468-6598-4b4f-9eab-1b388e1ed960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/ton618cyber/5651", "content": "New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution\n\nGitLab fixes eight security flaws, including a critical CI/CD pipeline vulnerability CVE-2024-9164. Update now!\n\nthehackernews.com \u2022 Oct 11, 2024", "creation_timestamp": "2024-10-14T13:00:25.000000Z"}, {"uuid": "1300ae15-37f7-4056-82d7-f8d2fc0271fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1397", "content": "", "creation_timestamp": "2024-10-14T04:00:00.000000Z"}, {"uuid": "5325619b-37c0-4af9-8e78-2fc1695dde79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/cvedetector/7676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9164 - GitLab EE Pipeline Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9164 \nPublished : Oct. 11, 2024, 1:15 p.m. | 36\u00a0minutes ago \nDescription : An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T16:11:07.000000Z"}, {"uuid": "4c6c28ab-a4c7-4a8f-b159-793937a228d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-9164", "type": "seen", "source": "https://vulnerability.circl.lu/comment/af885327-bc8d-4e07-9ea5-a86cda87beb0", "content": "", "creation_timestamp": "2024-10-11T12:22:18.480655Z"}, {"uuid": "8c6f7d70-b2c7-46c4-a091-0e0bc505289f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "da56ea03-bf9c-410f-92c7-cb32ea4c5076", "vulnerability": "cve-2024-9164", "type": "seen", "source": "https://vulnerability.circl.lu/comment/62ceedbe-65b3-4d7b-ab79-6c0240b18d71", "content": "", "creation_timestamp": "2024-10-11T12:46:07.597963Z"}, {"uuid": "fb0e6c19-810c-4c6d-bc9f-2e9b3d573687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/db9dd42d-746e-40cf-bae6-61042f0c1d48", "content": "", "creation_timestamp": "2024-10-11T12:24:01.570554Z"}, {"uuid": "6c2ce64c-78c1-49d0-8b41-bae62bdc469b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/tech_b0lt_Genona/4721", "content": "\u0418\u0437\u0432\u0438\u043d\u0438\u0442\u0435, \u043d\u043e \u0442\u0443\u0442 \u043e\u043f\u044f\u0442\u044c GitLab \u043e\u0431\u043e\u0441\u0440\u0430\u043b\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u043a\u0430\u043b\n\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u0430\u0448\u0430 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u0430\u044f \u0440\u0443\u0431\u0440\u0438\u043a\u0430: \u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u043c \u0433\u0438\u0442\u043b\u0430\u0431\u0447\u0438\u043a\u0438 \ud83d\udc85\ud83d\udc85\ud83d\udc85\n\nRun pipelines on arbitrary branches\nAn issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches. This is a critical severity issue (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N, 9.6). It is now mitigated in the latest release and is assigned CVE-2024-9164.\nhttps://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/", "creation_timestamp": "2024-10-10T21:46:00.000000Z"}, {"uuid": "0d1febaa-7cf5-417b-9db1-63a9e9fb3831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/HackingInsights/15675", "content": "\u200aCVE-2024-9164 (CVSS 9.6): GitLab Users Urged to Update Now\n\nhttps://securityonline.info/cve-2024-9164-cvss-9-6-gitlab-users-urged-to-update-now/", "creation_timestamp": "2024-10-10T09:20:30.000000Z"}, {"uuid": "d08aa80e-2e16-40bb-9303-099fb0d284e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/thehackernews/5720", "content": "\ud83d\udea9 A critical security flaw in GitLab (CVE-2024-9164) could allow attackers to run CI/CD pipelines on unauthorized branches. \n \nFind details here: https://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html \n \nUpdate your instance ASAP to avoid becoming the next victim.", "creation_timestamp": "2024-10-11T08:35:39.000000Z"}, {"uuid": "a22c2d4a-82c7-4b2d-9de3-35483ba5d154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/CyberBulletin/1148", "content": "\u26a1\ufe0fCVE-2024-9164 (CVSS 9.6): GitLab Users Urged to Update Now.\n\n#CyberBulletin", "creation_timestamp": "2024-10-10T11:34:05.000000Z"}, {"uuid": "e0c06aa9-e963-4076-a3c5-34d210eabc0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/ton618cyber/1992", "content": "New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution\n\nGitLab fixes eight security flaws, including a critical CI/CD pipeline vulnerability CVE-2024-9164. Update now!\n\nthehackernews.com \u2022 Oct 11, 2024", "creation_timestamp": "2024-10-14T13:00:27.000000Z"}, {"uuid": "4227bda2-1530-4a04-a7e7-6735613b6467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "Telegram/-cqmSrgumLQ2jYXKRRHU3wMdiR5fvOPkrr9ywUIBI7NJ2g", "content": "", "creation_timestamp": "2024-10-11T12:16:07.000000Z"}, {"uuid": "b7402159-a39f-41d1-913c-8db6c106cc50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/KomunitiSiber/2702", "content": "New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution\nhttps://thehackernews.com/2024/10/new-critical-gitlab-vulnerability-could.html\n\nGitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches.\nTracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10.\n\n\"An issue was discovered in GitLab EE", "creation_timestamp": "2024-10-11T10:22:09.000000Z"}, {"uuid": "0cf0e8e4-1424-4a20-b0ba-83d3125bf4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/true_secator/6305", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b \u0432\u044b\u043f\u0443\u0441\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 GitLab: 17.4.2, 17.3.5, 17.2.9 \u0434\u043b\u044f GitLab Community Edition (CE) \u0438 Enterprise Edition (EE).\n\n\u0412 \u043e\u0431\u0449\u0435\u043c \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f \u043e \u0432\u043e\u0441\u044c\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u043e\u0434\u043d\u0430 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f, \u0447\u0435\u0442\u044b\u0440\u0435 - \u0432\u044b\u0441\u043e\u043a\u043e\u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435, \u0434\u0432\u0435 - \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0438 \u043e\u0434\u043d\u0430 - \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438.\n\nCVSS 9.6 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u0430 CVE-2024-9164 \u0432 GitLab EE, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 12.5 \u0434\u043e 17.2.9, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 17.3, \u0434\u043e 17.3.5 \u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 17.4 \u0434\u043e 17.4.2, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043a\u043e\u043d\u0432\u0435\u0439\u0435\u0440\u044b \u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0432\u0435\u0442\u0432\u044f\u0445.\n\n\u0421\u0440\u0435\u0434\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 - CVE-2024-8970 (CVSS 8.2), CVE-2024-8977 (CVSS 8.2) \u0438 CVE-2024-9631 (CVSS 7.5), CVE-2024-6530 (CVSS 7.3), \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 - CVE-2024-9623 (CVSS 4.9) \u0438 CVE-2024-9623 (CVSS 4.3), \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0438\u0437\u043a\u043e\u0439 - CVE-2024-9596 (CVSS 3.7).\n\n\u0421\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u0438\u0437 \u043e\u0448\u0438\u0431\u043e\u043a \u0434\u043e \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435 \u043f\u043e\u0441\u0442\u0443\u043f\u0430\u043b\u043e.\n\n\u0427\u0435\u0433\u043e \u043d\u0435 \u0441\u043a\u0430\u0436\u0435\u0448\u044c \u043f\u0440\u043e 0-day \u0432 Mozilla Firefox, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0443\u044e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0447\u0435\u043c, Mozilla \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430. CVE-2024-9680 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 ESET \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u0448\u043a\u0430\u043b\u0435 \u0430\u043d\u0438\u043c\u0430\u0446\u0438\u0438 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0430\u0435\u0442 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0432\u0441\u0435\u0445 \u0430\u043d\u0438\u043c\u0430\u0446\u0438\u0439, \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u043d\u044b\u0445 \u043a \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u0443 \u0438\u043b\u0438 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u044b\u043c \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u043c.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u0432\u0435\u0440\u0441\u0438\u044e Firefox (\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u0432\u044b\u043f\u0443\u0441\u043a) \u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u0438 \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 (ESR).\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Firefox 131.0.2, Firefox ESR 115.16.1 \u0438 Firefox ESR 128.3.1.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0439 \u0441\u0442\u0430\u0442\u0443\u0441 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-9680 \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u0442\u043e\u043c, \u043d\u0430 \u043a\u043e\u0433\u043e \u043e\u043d\u0430 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0432 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435 \u043e\u0437\u0430\u0431\u043e\u0442\u0438\u0442\u044c\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c.", "creation_timestamp": "2024-10-10T15:20:05.000000Z"}, {"uuid": "bc97c21f-4dcc-4cd6-a38b-d4548ce50958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "Telegram/0X6ey2G0KG1oOgZYIy7zJKWXRBVId91G2bCQle7xTXgLkw", "content": "", "creation_timestamp": "2024-10-11T10:34:28.000000Z"}, {"uuid": "ce37edca-d60e-4690-a9e2-2a49434fd48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/23383", "content": "The Hacker News\nNew Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution\n\nGitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches.\nTracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10.\n\n\"An issue was discovered in GitLab EE", "creation_timestamp": "2024-10-11T10:34:29.000000Z"}, {"uuid": "bc8ed732-cf30-472e-92a6-3e83003b99d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/5083", "content": "The Hacker News\nNew Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution\n\nGitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches.\nTracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10.\n\n\"An issue was discovered in GitLab EE", "creation_timestamp": "2024-10-11T10:34:29.000000Z"}, {"uuid": "5d9783ab-5184-44d6-8575-1e1b6e62374f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9164", "type": "seen", "source": "https://t.me/CyberBulletin/26062", "content": "\u26a1\ufe0fCVE-2024-9164 (CVSS 9.6): GitLab Users Urged to Update Now.\n\n#CyberBulletin", "creation_timestamp": "2024-10-10T11:34:05.000000Z"}]}