Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paessler prtg network monitor vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2023-51630
Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote malicious users to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability...
Paessler Prtg Network Monitor
6.1
CVSSv3
CVE-2016-5078
Paessler PRTG prior to 16.2.24.4045 has XSS via SNMP.
Paessler Prtg Network Monitor
5.3
CVSSv3
CVE-2020-11547
PRTG Network Monitor prior to 20.1.57.1745 allows remote unauthenticated malicious users to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm ...
Paessler Prtg Network Monitor
2 Github repositories
8.8
CVSSv3
CVE-2018-19411
PRTG Network Monitor prior to 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2018-9276
An issue exists in PRTG Network Monitor prior to 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters i...
Paessler Prtg Network Monitor
1 EDB exploit
2 Github repositories
5.3
CVSSv3
CVE-2021-27220
An issue exists in PRTG Network Monitor prior to 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
Paessler Prtg Network Monitor
8.8
CVSSv3
CVE-2023-31452
A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and previous versions versions that allows remote malicious users to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigge...
Paessler Prtg Network Monitor
6.5
CVSSv3
CVE-2015-7743
XML external entity vulnerability in PRTG Network Monitor prior to 16.2.23.3077/3078 allows remote authenticated users to read arbitrary files by creating a new HTTP XML/REST Value sensor that accesses a crafted XML file.
Paessler Prtg Network Monitor
4.7
CVSSv3
CVE-2023-31449
A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and previous versions versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. Thi...
Paessler Prtg Network Monitor
4.7
CVSSv3
CVE-2023-31450
A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and previous versions versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made...
Paessler Prtg Network Monitor
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »