{"vulnerability": "CVE-2024-8311", "sightings": [{"uuid": "fbc4c877-a51d-40b3-8339-527f3ceef276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8311", "type": "seen", "source": "https://t.me/cvedetector/5512", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8311 - GitLab Pipeline Execution Policy Variable Overwrite Protection Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-8311 \nPublished : Sept. 12, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T21:53:30.000000Z"}]}