Graylog log management platform vulnerability in versions 2.0.0 to 5.2.4 allows arbitrary class instantiation via HTTP PUT request, leading to code execution and information exposur
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Arbitrary Code Execution | 8 Feb 202406:45 | – | veracode |
![]() | Design/Logic Flaw | 7 Feb 202418:15 | – | prion |
![]() | Graylog vulnerable to instantiation of arbitrary classes triggered by API request | 7 Feb 202418:23 | – | osv |
![]() | CVE-2024-24824 graylog2-server vulnerable to instantiation of arbitrary classes triggered by API request | 7 Feb 202417:25 | – | cvelist |
![]() | CVE-2024-24824 | 7 Feb 202418:15 | – | nvd |
![]() | CVE-2024-24824 | 7 Feb 202418:15 | – | cve |
![]() | Graylog vulnerable to instantiation of arbitrary classes triggered by API request | 7 Feb 202418:23 | – | github |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo