Lucene search

K
PaesslerPrtg Network Monitor

6 matches found

CVE
CVE
added 2018/07/02 4:29 p.m.270 views

CVE-2018-9276

An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or n...

9CVSS7AI score0.83837EPSS
CVE
CVE
added 2018/11/21 4:29 p.m.257 views

CVE-2018-19410

PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local ...

9.8CVSS9.4AI score0.92782EPSS
CVE
CVE
added 2018/11/21 4:29 p.m.77 views

CVE-2018-19411

PRTG Network Monitor before 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.

8.8CVSS8.5AI score0.0043EPSS
CVE
CVE
added 2018/04/21 2:29 a.m.64 views

CVE-2018-10253

Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.

7.5CVSS7.5AI score0.10232EPSS
CVE
CVE
added 2018/11/12 4:29 p.m.62 views

CVE-2018-19204

PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can c...

9CVSS8.8AI score0.0309EPSS
CVE
CVE
added 2018/11/12 4:29 p.m.42 views

CVE-2018-19203

PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.

7.5CVSS7.5AI score0.00845EPSS