PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.
References
Link | Resource |
---|---|
http://en.securitylab.ru/lab/PT-2018-22 | Third Party Advisory |
https://www.paessler.com/prtg/history/stable#18.2.41.1652 | Vendor Advisory |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-22/ | Third Party Advisory |
http://en.securitylab.ru/lab/PT-2018-22 | Third Party Advisory |
https://www.paessler.com/prtg/history/stable#18.2.41.1652 | Vendor Advisory |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-22/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://en.securitylab.ru/lab/PT-2018-22 - Third Party Advisory | |
References | () https://www.paessler.com/prtg/history/stable#18.2.41.1652 - Vendor Advisory | |
References | () https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-22/ - Third Party Advisory |
Information
Published : 2018-11-12 16:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19203
Mitre link : CVE-2018-19203
CVE.ORG link : CVE-2018-19203
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE