CVE-2024-6747
10.10.2024, 08:15
Information leakage in mknotifyd in Checkmk before 2.3.0p18, 2.2.0p36, 2.1.0p49 and in 2.0.0p39 (EOL) allows attacker to get potentially sensitive dataEnginsight
Vendor | Product | Version |
---|---|---|
checkmk | checkmk | 2.3.0p18 < 𝑥 < 2.3.0p18 |
checkmk | checkmk | 2.2.0p36 < 𝑥 < 2.2.0p36 |
checkmk | checkmk | 2.1.0p49 < 𝑥 < 2.1.0p49 |
checkmk | checkmk | 2.0.0p39 < 𝑥 < 2.0.0p39 |
checkmk | checkmk | 2.0.0 ≤ 𝑥 < 2.1.0 |
checkmk | checkmk | 2.1.0 |
checkmk | checkmk | 2.1.0:p1 |
checkmk | checkmk | 2.1.0:p10 |
checkmk | checkmk | 2.1.0:p11 |
checkmk | checkmk | 2.1.0:p12 |
checkmk | checkmk | 2.1.0:p13 |
checkmk | checkmk | 2.1.0:p14 |
checkmk | checkmk | 2.1.0:p15 |
checkmk | checkmk | 2.1.0:p16 |
checkmk | checkmk | 2.1.0:p17 |
checkmk | checkmk | 2.1.0:p18 |
checkmk | checkmk | 2.1.0:p19 |
checkmk | checkmk | 2.1.0:p2 |
checkmk | checkmk | 2.1.0:p20 |
checkmk | checkmk | 2.1.0:p21 |
checkmk | checkmk | 2.1.0:p22 |
checkmk | checkmk | 2.1.0:p23 |
checkmk | checkmk | 2.1.0:p24 |
checkmk | checkmk | 2.1.0:p25 |
checkmk | checkmk | 2.1.0:p26 |
checkmk | checkmk | 2.1.0:p27 |
checkmk | checkmk | 2.1.0:p28 |
checkmk | checkmk | 2.1.0:p29 |
checkmk | checkmk | 2.1.0:p3 |
checkmk | checkmk | 2.1.0:p30 |
checkmk | checkmk | 2.1.0:p31 |
checkmk | checkmk | 2.1.0:p32 |
checkmk | checkmk | 2.1.0:p33 |
checkmk | checkmk | 2.1.0:p34 |
checkmk | checkmk | 2.1.0:p35 |
checkmk | checkmk | 2.1.0:p36 |
checkmk | checkmk | 2.1.0:p37 |
checkmk | checkmk | 2.1.0:p38 |
checkmk | checkmk | 2.1.0:p39 |
checkmk | checkmk | 2.1.0:p4 |
checkmk | checkmk | 2.1.0:p40 |
checkmk | checkmk | 2.1.0:p41 |
checkmk | checkmk | 2.1.0:p42 |
checkmk | checkmk | 2.1.0:p43 |
checkmk | checkmk | 2.1.0:p44 |
checkmk | checkmk | 2.1.0:p45 |
checkmk | checkmk | 2.1.0:p46 |
checkmk | checkmk | 2.1.0:p47 |
checkmk | checkmk | 2.1.0:p48 |
checkmk | checkmk | 2.1.0:p5 |
checkmk | checkmk | 2.1.0:p6 |
checkmk | checkmk | 2.1.0:p7 |
checkmk | checkmk | 2.1.0:p8 |
checkmk | checkmk | 2.1.0:p9 |
checkmk | checkmk | 2.2.0 |
checkmk | checkmk | 2.2.0:p1 |
checkmk | checkmk | 2.2.0:p10 |
checkmk | checkmk | 2.2.0:p11 |
checkmk | checkmk | 2.2.0:p12 |
checkmk | checkmk | 2.2.0:p13 |
checkmk | checkmk | 2.2.0:p14 |
checkmk | checkmk | 2.2.0:p15 |
checkmk | checkmk | 2.2.0:p16 |
checkmk | checkmk | 2.2.0:p17 |
checkmk | checkmk | 2.2.0:p18 |
checkmk | checkmk | 2.2.0:p19 |
checkmk | checkmk | 2.2.0:p2 |
checkmk | checkmk | 2.2.0:p20 |
checkmk | checkmk | 2.2.0:p21 |
checkmk | checkmk | 2.2.0:p22 |
checkmk | checkmk | 2.2.0:p23 |
checkmk | checkmk | 2.2.0:p24 |
checkmk | checkmk | 2.2.0:p25 |
checkmk | checkmk | 2.2.0:p26 |
checkmk | checkmk | 2.2.0:p27 |
checkmk | checkmk | 2.2.0:p28 |
checkmk | checkmk | 2.2.0:p29 |
checkmk | checkmk | 2.2.0:p3 |
checkmk | checkmk | 2.2.0:p30 |
checkmk | checkmk | 2.2.0:p31 |
checkmk | checkmk | 2.2.0:p32 |
checkmk | checkmk | 2.2.0:p33 |
checkmk | checkmk | 2.2.0:p34 |
checkmk | checkmk | 2.2.0:p35 |
checkmk | checkmk | 2.2.0:p4 |
checkmk | checkmk | 2.2.0:p5 |
checkmk | checkmk | 2.2.0:p6 |
checkmk | checkmk | 2.2.0:p7 |
checkmk | checkmk | 2.2.0:p8 |
checkmk | checkmk | 2.2.0:p9 |
checkmk | checkmk | 2.3.0 |
checkmk | checkmk | 2.3.0:p1 |
checkmk | checkmk | 2.3.0:p10 |
checkmk | checkmk | 2.3.0:p11 |
checkmk | checkmk | 2.3.0:p12 |
checkmk | checkmk | 2.3.0:p13 |
checkmk | checkmk | 2.3.0:p14 |
checkmk | checkmk | 2.3.0:p15 |
checkmk | checkmk | 2.3.0:p16 |
checkmk | checkmk | 2.3.0:p17 |
checkmk | checkmk | 2.3.0:p2 |
checkmk | checkmk | 2.3.0:p3 |
checkmk | checkmk | 2.3.0:p4 |
checkmk | checkmk | 2.3.0:p5 |
checkmk | checkmk | 2.3.0:p6 |
checkmk | checkmk | 2.3.0:p7 |
checkmk | checkmk | 2.3.0:p8 |
checkmk | checkmk | 2.3.0:p9 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
- CWE-201 - Insertion of Sensitive Information Into Sent DataThe code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
References