{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T23:12:40.143","vulnerabilities":[{"cve":{"id":"CVE-2024-6585","sourceIdentifier":"mandiant-cve@google.com","published":"2024-08-30T23:15:12.627","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple stored cross-site scripting (“XSS”) vulnerabilities in the markdown dashboard and dashboard comment functionality of Lightdash version 0.1024.6 allows remote authenticated threat actors to inject malicious scripts into vulnerable web pages. A threat actor could potentially exploit this vulnerability to store malicious JavaScript which executes in the context of a user’s session with the application."},{"lang":"es","value":"Varias vulnerabilidades de cross site scripting (“XSS”) almacenado en el panel de control de Markdown y la funcionalidad de comentarios del panel de control de la versión 0.1024.6 de Lightdash permiten que actores de amenazas autenticados de forma remota inyecten secuencias de comandos maliciosas en páginas web vulnerables. Un actor de amenazas podría explotar esta vulnerabilidad para almacenar código JavaScript malicioso que se ejecuta en el contexto de la sesión de un usuario con la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"mandiant-cve@google.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://github.com/google/security-research/security/advisories/GHSA-6529-6jv3-66q2","source":"mandiant-cve@google.com"},{"url":"https://github.com/lightdash/lightdash","source":"mandiant-cve@google.com"},{"url":"https://github.com/lightdash/lightdash/pull/9359","source":"mandiant-cve@google.com"},{"url":"https://github.com/lightdash/lightdash/pull/9510","source":"mandiant-cve@google.com"},{"url":"https://github.com/lightdash/lightdash/releases/tag/0.1042.2","source":"mandiant-cve@google.com"},{"url":"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9359.patch","source":"mandiant-cve@google.com"},{"url":"https://patch-diff.githubusercontent.com/raw/lightdash/lightdash/pull/9510.patch","source":"mandiant-cve@google.com"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-6585","source":"mandiant-cve@google.com"}]}}]}