Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network monitor vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-19410
PRTG Network Monitor prior to 18.2.40.1683 allows remote unauthenticated malicious users to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /...
Paessler Prtg Network Monitor
2 Github repositories
7.2
CVSSv3
CVE-2023-23842
The SolarWinds Network Configuration Manager was susceptible to the Directory Traversal Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.
Solarwinds Network Configuration Monitor
9.8
CVSSv3
CVE-2020-10374
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2019-11074
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows malicious users to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation whe...
Paessler Prtg Network Monitor
5.4
CVSSv3
CVE-2017-12879
Cross-site scripting (XSS-STORED) vulnerability in the DEVICES OR SENSORS functionality in Paessler PRTG Network Monitor prior to 17.3.33.2654 allows authenticated remote malicious users to inject arbitrary web script or HTML.
Paessler Prtg Network Monitor
7.5
CVSSv3
CVE-2018-10253
Paessler PRTG Network Monitor prior to 18.1.39.1648 mishandles stack memory during unspecified API calls.
Paessler Prtg Network Monitor
1 EDB exploit
1 Github repository
5.3
CVSSv3
CVE-2021-27220
An issue exists in PRTG Network Monitor prior to 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
Paessler Prtg Network Monitor
5.3
CVSSv3
CVE-2022-35739
PRTG Network Monitor up to and including 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inse...
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2023-32781
A command injection vulnerability was identified in PRTG 23.2.84.1566 and previous versions versions in the HL7 sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. ...
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2023-32782
A command injection was identified in PRTG 23.2.84.1566 and previous versions versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The s...
Paessler Prtg Network Monitor
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »