Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 18 Nov 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:* |
Tue, 12 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ivanti
Ivanti endpoint Manager |
|
| CPEs | cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ivanti
Ivanti endpoint Manager |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ivanti
Published:
Updated: 2024-11-19T04:56:07.498Z
Reserved: 2024-10-22T16:41:33.250Z
Link: CVE-2024-50324
Updated: 2024-11-12T18:43:26.197Z
Status : Analyzed
Published: 2024-11-12T16:15:24.653
Modified: 2024-11-18T17:06:27.200
Link: CVE-2024-50324
No data.
OpenCVE Enrichment
No data.