{"vulnerability": "CVE-2024-4612", "sightings": [{"uuid": "5540ad53-c80e-4d89-8492-8f88b8da78fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4612", "type": "seen", "source": "https://t.me/cvedetector/5503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4612 - GitLab OAuth Open Redirectumping\", \n  \"Content\": \"CVE ID : CVE-2024-4612 \nPublished : Sept. 12, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T19:48:09.000000Z"}]}