{"uuid": "5f47e323-46a9-44e7-899b-e11de75c44fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8640", "type": "seen", "source": "https://t.me/cvedetector/5496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8640 - GitLab EE Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8640 \nPublished : Sept. 12, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T19:47:58.000000Z"}