{"uuid": "e824cfa5-a12c-4ae4-8c90-7ca90734a667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45758", "type": "seen", "source": "https://t.me/cvedetector/4978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45758 - H2O.ai H2O Unvalidated JDBC URL Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-45758 \nPublished : Sept. 6, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:06:35.000000Z"}