Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Prtg_network_monitor
(Paessler)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 35 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-11-12 | CVE-2018-19203 | PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request. | Prtg_network_monitor | 7.5 | ||
2018-11-12 | CVE-2018-19204 | PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can... | Prtg_network_monitor | 8.8 | ||
2019-04-10 | CVE-2018-14683 | PRTG before 19.1.49.1966 has Cross Site Scripting (XSS) in the WEBGUI. | Prtg_network_monitor | 6.1 | ||
2020-03-17 | CVE-2019-11074 | A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor. | Prtg_network_monitor | 7.2 | ||
2020-03-30 | CVE-2020-10374 | A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form. | Prtg_network_monitor | N/A | ||
2020-04-05 | CVE-2020-11547 | PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm. | Prtg_network_monitor | N/A | ||
2020-03-16 | CVE-2019-11073 | A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed. | Prtg_network_monitor | N/A | ||
2019-12-31 | CVE-2019-9207 | PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued. | Prtg_network_monitor | N/A | ||
2019-12-31 | CVE-2019-9206 | PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued. | Prtg_network_monitor | N/A | ||
2017-10-26 | CVE-2017-15917 | In Paessler PRTG Network Monitor 17.3.33.2830, it's possible to create a Map as a read-only user, by forging a request and sending it to the server. | Prtg_network_monitor | 6.5 |