{"uuid": "a6d9da33-d413-4dc1-89d7-37b7940f98f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8635", "type": "seen", "source": "https://t.me/cvedetector/5495", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8635 - GitLab SSRF\", \n  \"Content\": \"CVE ID : CVE-2024-8635 \nPublished : Sept. 12, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T19:47:57.000000Z"}