Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache HertzBeat.
This issue affects Apache HertzBeat: before 1.6.1.
Users are recommended to upgrade to version 1.6.1, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache hertzbeat |
|
CPEs | cpe:2.3:a:apache:hertzbeat:-:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache hertzbeat |
|
Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache HertzBeat. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue. | |
Title | Apache HertzBeat: Exposure sensitive token via http GET method with query string | |
Weaknesses | CWE-200 | |
References |
|
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2024-11-18T08:45:23.459Z
Updated: 2024-11-18T15:04:55.582Z
Reserved: 2024-09-09T13:34:37.283Z
Link: CVE-2024-45791
Vulnrichment
Updated: 2024-11-18T09:03:39.395Z
NVD
Status : Awaiting Analysis
Published: 2024-11-18T09:15:05.990
Modified: 2024-11-18T17:11:17.393
Link: CVE-2024-45791
Redhat
No data.