Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39631 | Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. |
Wed, 28 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Upkeeper
Upkeeper upkeeper Manager |
|
| CPEs | cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Upkeeper
Upkeeper upkeeper Manager |
|
| Metrics |
cvssV3_1
|
Fri, 16 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Aug 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9. | |
| Title | Leak of user information | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: upKeeper
Published:
Updated: 2024-08-16T15:50:20.872Z
Reserved: 2024-08-02T11:37:42.270Z
Link: CVE-2024-42464
Updated: 2024-08-16T15:50:16.062Z
Status : Analyzed
Published: 2024-08-16T14:15:13.933
Modified: 2024-08-28T20:35:52.940
Link: CVE-2024-42464
No data.
OpenCVE Enrichment
No data.
EUVD