Paessler IPCheck Server Monitor before 5.3.3.639/640 does not properly implement a "list of acceptable host IP addresses in the probe settings," which has unknown impact and attack vectors.
Max CVSS
10.0
EPSS Score
0.19%
Published
2006-08-31
Updated
2008-09-05
Cross-site scripting (XSS) vulnerability in the Monitor_Bandwidth function in PRTG Traffic Grapher 6.2.2.977 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Max CVSS
4.3
EPSS Score
0.14%
Published
2009-06-01
Updated
2009-06-29
XML external entity vulnerability in PRTG Network Monitor before 16.2.23.3077/3078 allows remote authenticated users to read arbitrary files by creating a new HTTP XML/REST Value sensor that accesses a crafted XML file.
Max CVSS
6.5
EPSS Score
0.16%
Published
2017-01-23
Updated
2017-01-25
Paessler PRTG before 16.2.24.4045 has XSS via SNMP.
Max CVSS
6.1
EPSS Score
0.08%
Published
2017-04-10
Updated
2021-06-29
Cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor before 17.2.32.2279 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Max CVSS
6.1
EPSS Score
0.12%
Published
2017-08-18
Updated
2017-08-24
Cross-site scripting (XSS-STORED) vulnerability in the DEVICES OR SENSORS functionality in Paessler PRTG Network Monitor before 17.3.33.2654 allows authenticated remote attackers to inject arbitrary web script or HTML.
Max CVSS
5.4
EPSS Score
0.11%
Published
2017-08-24
Updated
2017-09-12
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all sensor titles, related to incorrect error handling for a %00 in the SRC attribute of an IMG element.
Max CVSS
4.8
EPSS Score
0.06%
Published
2017-10-04
Updated
2017-10-12
PRTG Network Monitor version 17.3.33.2830 is vulnerable to reflected Cross-Site Scripting on error.htm (the error page), via the errormsg parameter.
Max CVSS
6.1
EPSS Score
0.18%
Published
2017-10-04
Updated
2017-10-12
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all group names created, related to incorrect error handling for an HTML encoded script.
Max CVSS
5.4
EPSS Score
0.06%
Published
2017-10-15
Updated
2017-11-01
PRTG Network Monitor 17.3.33.2830 allows remote authenticated administrators to execute arbitrary code by uploading a .exe file and then proceeding in spite of the error message.
Max CVSS
6.7
EPSS Score
1.10%
Published
2017-10-20
Updated
2017-10-31
In Paessler PRTG Network Monitor 17.3.33.2830, it's possible to create a Map as a read-only user, by forging a request and sending it to the server.
Max CVSS
6.5
EPSS Score
0.06%
Published
2017-10-26
Updated
2019-10-03

CVE-2018-9276

Public exploit
An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
Max CVSS
9.0
EPSS Score
53.68%
Published
2018-07-02
Updated
2023-04-25
Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.
Max CVSS
7.5
EPSS Score
0.64%
Published
2018-04-21
Updated
2018-05-22
PRTG before 19.1.49.1966 has Cross Site Scripting (XSS) in the WEBGUI.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-04-10
Updated
2021-06-29
PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.
Max CVSS
7.5
EPSS Score
0.20%
Published
2018-11-12
Updated
2021-06-29
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor.
Max CVSS
9.0
EPSS Score
0.49%
Published
2018-11-12
Updated
2021-06-29
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Max CVSS
9.8
EPSS Score
0.29%
Published
2018-11-21
Updated
2019-10-03
PRTG Network Monitor before 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.
Max CVSS
8.8
EPSS Score
0.09%
Published
2018-11-21
Updated
2019-10-03
PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued.
Max CVSS
6.1
EPSS Score
0.21%
Published
2019-12-31
Updated
2020-01-03
PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued.
Max CVSS
6.1
EPSS Score
0.12%
Published
2019-12-31
Updated
2020-01-03
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
Max CVSS
9.0
EPSS Score
2.92%
Published
2020-03-16
Updated
2020-08-24
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.
Max CVSS
9.0
EPSS Score
0.91%
Published
2020-03-17
Updated
2021-06-29
An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.
Max CVSS
5.5
EPSS Score
0.05%
Published
2020-02-03
Updated
2021-07-21
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
Max CVSS
9.8
EPSS Score
1.12%
Published
2020-03-30
Updated
2020-06-25
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
Max CVSS
5.3
EPSS Score
0.11%
Published
2020-04-05
Updated
2022-06-28
37 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!