This vulnerability can only be exploited by authorized attackers.
This issue affects Apache HertzBeat: before 1.6.1.
Users are recommended to upgrade to version 1.6.1, which fixes the issue.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Jun 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache hertzbeat |
|
| CPEs | cpe:2.3:a:apache:hertzbeat:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache hertzbeat |
|
| Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of Untrusted Data vulnerability in Apache HertzBeat. This vulnerability can only be exploited by authorized attackers. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue. | |
| Title | Apache HertzBeat: RCE by notice template injection vulnerability | |
| Weaknesses | CWE-502 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-11-18T15:07:22.821Z
Reserved: 2024-07-16T08:51:21.881Z
Link: CVE-2024-41151
Updated: 2024-11-18T09:03:31.950Z
Status : Analyzed
Published: 2024-11-18T09:15:05.010
Modified: 2025-06-24T16:29:09.163
Link: CVE-2024-41151
No data.
OpenCVE Enrichment
No data.