Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2018-18552

Disclosure Date: October 24, 2018 (last updated November 27, 2024)
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
0
Attacker Value
Unknown

CVE-2018-18551

Disclosure Date: October 24, 2018 (last updated November 27, 2024)
ServersCheck Monitoring Software through 14.3.3 has Persistent and Reflected XSS via the sensors.html status parameter, sensors.html type parameter, sensors.html device parameter, report.html location parameter, group_delete.html group parameter, report_save.html query parameter, sensors.html location parameter, or group_delete.html group parameter.
0
Attacker Value
Unknown

CVE-2018-18550

Disclosure Date: October 21, 2018 (last updated November 27, 2024)
ServersCheck Monitoring Software before 14.3.4 allows SQL Injection by an authenticated user.
0
Attacker Value
Unknown

CVE-2017-17832

Disclosure Date: December 27, 2017 (last updated November 26, 2024)
ServersCheck Monitoring Software before 14.2.3 is prone to a cross-site scripting vulnerability as user supplied-data is not validated/sanitized when passed in the settings_SMS_ALERT_TYPE parameter, and JavaScript can be executed on settings-save.html (the Settings - SMS Alerts page).
0
Attacker Value
Unknown

CVE-2005-1798

Disclosure Date: May 29, 2005 (last updated February 22, 2025)
Directory traversal vulnerability in ServersCheck Monitoring Software 5.9.0 to 5.10.0 allows remote attackers to read arbitrary files via .. (dot dot) sequences in an HTTP request.
0