Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39630 | Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. |
Wed, 28 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 20 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Upkeeper
Upkeeper upkeeper Manager |
|
| CPEs | cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Upkeeper
Upkeeper upkeeper Manager |
|
| Metrics |
ssvc
|
Fri, 16 Aug 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. | |
| Title | Leak of organizations messages | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: upKeeper
Published:
Updated: 2024-08-20T16:51:09.282Z
Reserved: 2024-08-02T11:37:42.270Z
Link: CVE-2024-42463
Updated: 2024-08-20T16:51:03.705Z
Status : Analyzed
Published: 2024-08-16T14:15:13.650
Modified: 2024-08-28T20:38:25.227
Link: CVE-2024-42463
No data.
OpenCVE Enrichment
No data.
EUVD