This issue affects Apache HertzBeat: before 1.6.1.
Users are recommended to upgrade to version 1.6.1, which fixes the issue.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Jun 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache hertzbeat |
|
| CPEs | cpe:2.3:a:apache:hertzbeat:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache hertzbeat |
|
| Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache HertzBeat. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue. | |
| Title | Apache HertzBeat: Exposure sensitive token via http GET method with query string | |
| Weaknesses | CWE-200 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-11-18T15:04:55.582Z
Reserved: 2024-09-09T13:34:37.283Z
Link: CVE-2024-45791
Updated: 2024-11-18T09:03:39.395Z
Status : Analyzed
Published: 2024-11-18T09:15:05.990
Modified: 2025-06-24T16:22:41.543
Link: CVE-2024-45791
No data.
OpenCVE Enrichment
No data.