Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Oct 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:* |
Tue, 08 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ivanti
Ivanti avalanche |
|
| CPEs | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ivanti
Ivanti avalanche |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to leak sensitive information | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ivanti
Published:
Updated: 2024-10-08T17:39:16.171Z
Reserved: 2024-09-16T17:43:00.640Z
Link: CVE-2024-47011
Updated: 2024-10-08T17:39:05.296Z
Status : Analyzed
Published: 2024-10-08T17:15:55.533
Modified: 2024-10-16T13:28:40.480
Link: CVE-2024-47011
No data.
OpenCVE Enrichment
No data.