This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-12833.
More Stories
mupdf-1.24.6-4.fc41
FEDORA-2025-7d002ee0e7 Packages in this update: mupdf-1.24.6-4.fc41 Update description: fix CVE-2024-46657 (rhbz#2331627) Read More
golang-github-aws-sdk-2-20250103-1.fc42 golang-github-rclone-gofakes3-0.0.3-1.fc42 rclone-1.68.2-1.fc42
FEDORA-2025-9b0b1cc333 Packages in this update: golang-github-aws-sdk-2-20250103-1.fc42 golang-github-rclone-gofakes3-0.0.3-1.fc42 rclone-1.68.2-1.fc42 Update description: Fix for CVE-2024-52522 Read More
suricata-7.0.8-1.el8
FEDORA-EPEL-2025-02e26b51d5 Packages in this update: suricata-7.0.8-1.el8 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More
suricata-7.0.8-1.fc40
FEDORA-2025-aa783e1cbd Packages in this update: suricata-7.0.8-1.fc40 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More
suricata-7.0.8-1.el9
FEDORA-EPEL-2025-9dfb7c8f88 Packages in this update: suricata-7.0.8-1.el9 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More
suricata-7.0.8-1.fc41
FEDORA-2025-e24171db6d Packages in this update: suricata-7.0.8-1.fc41 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More