{"uuid": "1c93e315-6882-4e4d-93f1-9ba41db605e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48964", "type": "seen", "source": "https://t.me/cvedetector/8763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48964 - Snyk CLI Gradle Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48964 \nPublished : Oct. 23, 2024, 7:15 p.m. | 16\u00a0minutes ago \nDescription : The package Snyk CLI before 1.1294.0 is vulnerable to Code Injection when scanning an untrusted Gradle project. The vulnerability can be triggered if Snyk test is run inside the untrusted project due to the improper handling of the current working directory name. Snyk recommends only scanning trusted projects. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-23T21:35:27.000000Z"}