{"uuid": "cf1667e7-605c-466c-9df5-0b6e609e70f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10081", "type": "seen", "source": "https://t.me/cvedetector/10011", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10081 - CodeChecker Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10081 \nPublished : Nov. 6, 2024, 3:15 p.m. | 15\u00a0minutes ago \nDescription : CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.   \nAuthentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability.  \n  \nThis issue affects CodeChecker: through 6.24.1. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T16:40:10.000000Z"}