Lucene search

K
ApacheHertzbeat

5 matches found

CVE
CVE
added 2024/08/20 9:15 p.m.67 views

CVE-2024-42362

Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.

8.8CVSS8.6AI score0.00324EPSS
CVE
CVE
added 2024/09/21 10:15 a.m.52 views

CVE-2024-42323

SnakeYaml Deser Load Malicious xml rce vulnerability in Apache HertzBeat (incubating). This vulnerability can only be exploited by authorized attackers.This issue affects Apache HertzBeat (incubating): before 1.6.0. Users are recommended to upgrade to version 1.6.0, which fixes the issue.

8.8CVSS8.7AI score0.58722EPSS
CVE
CVE
added 2024/11/18 9:15 a.m.50 views

CVE-2024-45505

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache HertzBeat (incubating). This vulnerability can only be exploited by authorized attackers.This issue affects Apache HertzBeat (incubating): before 1.6.1. Users are recommended to upgrade to ve...

8.8CVSS8.8AI score0.01069EPSS
CVE
CVE
added 2024/11/18 9:15 a.m.45 views

CVE-2024-41151

Deserialization of Untrusted Data vulnerability in Apache HertzBeat. This vulnerability can only be exploited by authorized attackers. This issue affects Apache HertzBeat: before 1.6.1. Users are recommended to upgrade to version 1.6.1, which fixes the issue.

8.8CVSS8.7AI score0.00649EPSS
CVE
CVE
added 2023/12/22 9:15 p.m.25 views

CVE-2023-51387

Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a c...

8.8CVSS7.7AI score0.00383EPSS