This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-12833.
More Stories
rabbitmq-server-4.0.5-2.fc42
FEDORA-2025-7c46ce9b7d Packages in this update: rabbitmq-server-4.0.5-2.fc42 Update description: Automatic update for rabbitmq-server-4.0.5-2.fc42. Changelog * Thu Jan 2 2025 Richard W.M....
ZDI-CAN-25727: Rockwell Automation
A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'CrisprXiang With FDU and Hao Huang with FDU' was reported to...
EC2 Grouper Attack
What is the Attack?FortiGuard Labs Threat Team has observed recent attacks by a Threat Actor dubbed "EC2 Grouper" that leverages...
libxmp-4.6.1-2.fc41
FEDORA-2025-23e4aeeb91 Packages in this update: libxmp-4.6.1-2.fc41 Update description: Latest upstream release. Changelog: Fixes: CVE-2023-45679: Attempt to free an uninitialized memory...
libxmp-4.6.1-2.fc40
FEDORA-2025-c58133e520 Packages in this update: libxmp-4.6.1-2.fc40 Update description: Latest upstream release. Changelog: Fixes: CVE-2023-45679: Attempt to free an uninitialized memory...
xmlrpc-c-1.60.04-2.fc42
FEDORA-2025-a835dd04a0 Packages in this update: xmlrpc-c-1.60.04-2.fc42 Update description: Automatic update for xmlrpc-c-1.60.04-2.fc42. Changelog * Thu Jan 2 2025 Jonathan Wright...