{"uuid": "e1b0eb8d-ff76-4148-bbb0-319899e46b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10086", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1142", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10086\n\ud83d\udd39 Description: A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.\n\ud83d\udccf Published: 2024-10-30T21:21:46.559Z\n\ud83d\udccf Modified: 2025-01-10T13:06:42.658Z\n\ud83d\udd17 References:\n1. https://discuss.hashicorp.com/t/hcsec-2024-24-consul-vulnerable-to-reflected-xss-on-content-type-error-manipulation", "creation_timestamp": "2025-01-10T14:06:29.000000Z"}