{"vulnerability": "CVE-2025-0376", "sightings": [{"uuid": "3c0f7fc2-2222-4113-a889-52478393dff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyhqkpeuj2z", "content": "", "creation_timestamp": "2025-02-12T15:16:30.793347Z"}, {"uuid": "3dfc6808-ac9b-476c-8255-af5844e7a5ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113991936688930663", "content": "", "creation_timestamp": "2025-02-12T16:48:37.964600Z"}, {"uuid": "238d9025-fe0a-4d2e-a109-bf6dc70567f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhyurhpc552v", "content": "", "creation_timestamp": "2025-02-12T19:09:40.656649Z"}, {"uuid": "b7a4cd5a-02ba-49ae-8517-41a65c71a1db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3li2nomzlsh2m", "content": "", "creation_timestamp": "2025-02-13T12:08:08.771797Z"}, {"uuid": "a117d4f5-0bf2-4ab1-a698-5ad3c8065028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://t.me/cvedetector/17901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0376 - GitLab CE/EE Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0376 \nPublished : Feb. 12, 2025, 3:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page. \nSeverity: 8.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T18:33:43.000000Z"}, {"uuid": "83b6d350-0fcc-4484-b43a-f8d4a2779e16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0376", "type": "seen", "source": "https://t.me/suboxone_chatroom/7437", "content": "CVE-2025-0376 and other: Multiple vulnerabilitites in GitLab, 4.2 - 8.7 rating\u2757\ufe0f\n\nWith the new release, GitLab has disclosed several vulnerabilities, including XSS injection, DoS and others.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/50gFr\n\ud83d\udc49 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:\"gitlab\" OR http.headers.location:\"gitlab\"\n\nVendor's advisory: https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/", "creation_timestamp": "2025-04-01T12:37:19.000000Z"}]}