Show filters
38 Total Results
Displaying 11-20 of 38
Sort by:
Attacker Value
Unknown
CVE-2021-34547
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.
0
Attacker Value
Unknown
CVE-2021-27220
Disclosure Date: March 31, 2021 (last updated November 28, 2024)
An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
0
Attacker Value
Unknown
CVE-2020-14073
Disclosure Date: June 23, 2020 (last updated February 21, 2025)
XSS exists in PRTG Network Monitor 20.1.56.1574 via crafted map properties. An attacker with Read/Write privileges can create a map, and then use the Map Designer Properties screen to insert JavaScript code. This can be exploited against any user with View Maps or Edit Maps access.
0
Attacker Value
Unknown
CVE-2020-11547
Disclosure Date: April 05, 2020 (last updated February 21, 2025)
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
0
Attacker Value
Unknown
CVE-2020-10374
Disclosure Date: March 30, 2020 (last updated February 21, 2025)
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
0
Attacker Value
Unknown
CVE-2019-11074
Disclosure Date: March 17, 2020 (last updated February 21, 2025)
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
0
Attacker Value
Unknown
CVE-2019-11073
Disclosure Date: March 16, 2020 (last updated February 21, 2025)
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
0
Attacker Value
Unknown
CVE-2019-19119
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.
0
Attacker Value
Unknown
CVE-2019-9206
Disclosure Date: December 31, 2019 (last updated November 27, 2024)
PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued.
0
Attacker Value
Unknown
CVE-2019-9207
Disclosure Date: December 31, 2019 (last updated November 27, 2024)
PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued.
0