Vulnerabilities (CVE)

Filtered by vendor Paessler Subscribe
Total 37 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-35739 1 Paessler 1 Prtg Network Monitor 2024-11-21 N/A 5.3 MEDIUM
PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.
CVE-2021-34547 1 Paessler 1 Prtg Network Monitor 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.
CVE-2021-29643 1 Paessler 1 Prtg Network Monitor 2024-11-21 3.5 LOW 5.4 MEDIUM
PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.
CVE-2021-27220 1 Paessler 1 Prtg Network Monitor 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
CVE-2020-14073 1 Paessler 1 Prtg Network Monitor 2024-11-21 3.5 LOW 5.4 MEDIUM
XSS exists in PRTG Network Monitor 20.1.56.1574 via crafted map properties. An attacker with Read/Write privileges can create a map, and then use the Map Designer Properties screen to insert JavaScript code. This can be exploited against any user with View Maps or Edit Maps access.
CVE-2020-11547 1 Paessler 1 Prtg Network Monitor 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-10374 1 Paessler 1 Prtg Network Monitor 2024-11-21 7.5 HIGH 9.8 CRITICAL
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2019-9207 1 Paessler 1 Prtg Network Monitor 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued.
CVE-2019-9206 1 Paessler 1 Prtg Network Monitor 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued.
CVE-2019-19119 1 Paessler 1 Prtg Network Monitor 2024-11-21 2.1 LOW 5.5 MEDIUM
An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.
CVE-2019-11074 1 Paessler 1 Prtg Network Monitor 2024-11-21 9.0 HIGH 7.2 HIGH
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
CVE-2019-11073 1 Paessler 1 Prtg Network Monitor 2024-11-21 9.0 HIGH 7.2 HIGH
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
CVE-2018-9276 1 Paessler 1 Prtg Network Monitor 2024-11-21 9.0 HIGH 7.2 HIGH
An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
CVE-2018-19411 1 Paessler 1 Prtg Network Monitor 2024-11-21 6.5 MEDIUM 8.8 HIGH
PRTG Network Monitor before 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.
CVE-2018-19410 1 Paessler 1 Prtg Network Monitor 2024-11-21 7.5 HIGH 9.8 CRITICAL
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
CVE-2018-19204 1 Paessler 1 Prtg Network Monitor 2024-11-21 9.0 HIGH 8.8 HIGH
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor.
CVE-2018-19203 1 Paessler 1 Prtg Network Monitor 2024-11-21 5.0 MEDIUM 7.5 HIGH
PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.
CVE-2018-14683 1 Paessler 1 Prtg Network Monitor 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
PRTG before 19.1.49.1966 has Cross Site Scripting (XSS) in the WEBGUI.
CVE-2018-10253 1 Paessler 1 Prtg Network Monitor 2024-11-21 5.0 MEDIUM 7.5 HIGH
Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.
CVE-2017-9816 1 Paessler 1 Prtg Network Monitor 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor before 17.2.32.2279 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.