Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-45398 | This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system. |
Solution
Upgrade Wave 2.0 to version 1.1.7
Workaround
No workaround given by the vendor.
Fri, 08 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
63moons
63moons aero 63moons wave 2.0 |
|
| CPEs | cpe:2.3:a:63moons:aero:*:*:*:*:*:*:*:* cpe:2.3:a:63moons:wave_2.0:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
63moons
63moons aero 63moons wave 2.0 |
|
| Metrics |
cvssV3_1
|
Mon, 04 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Nov 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system. | |
| Title | Improper Error Handling Vulnerability in Wave 2.0 | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2024-11-04T15:01:54.521Z
Reserved: 2024-10-29T12:55:06.456Z
Link: CVE-2024-51560
Updated: 2024-11-04T15:01:50.902Z
Status : Analyzed
Published: 2024-11-04T13:17:05.810
Modified: 2024-11-08T15:18:23.127
Link: CVE-2024-51560
No data.
OpenCVE Enrichment
No data.
EUVD