Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
prtg network monitor vulnerabilities and exploits
(subscribe to this query)
4.7
CVSSv3
CVE-2023-31448
A path traversal vulnerability was identified in the HL7 sensor in PRTG 23.2.84.1566 and previous versions versions where an authenticated user with write permissions could trick the HL7 sensor into behaving differently for existing files and non-existing files. This made it poss...
Paessler Prtg Network Monitor
4.7
CVSSv3
CVE-2023-31449
A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and previous versions versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. Thi...
Paessler Prtg Network Monitor
4.7
CVSSv3
CVE-2023-31450
A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and previous versions versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made...
Paessler Prtg Network Monitor
8.8
CVSSv3
CVE-2023-31452
A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and previous versions versions that allows remote malicious users to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigge...
Paessler Prtg Network Monitor
6.1
CVSSv3
CVE-2023-51630
Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote malicious users to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability...
Paessler Prtg Network Monitor
5.3
CVSSv3
CVE-2022-35739
PRTG Network Monitor up to and including 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inse...
Paessler Prtg Network Monitor
6.5
CVSSv3
CVE-2017-15917
In Paessler PRTG Network Monitor 17.3.33.2830, it's possible to create a Map as a read-only user, by forging a request and sending it to the server.
Paessler Prtg Network Monitor 17.3.33.2830
5.4
CVSSv3
CVE-2017-15360
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all group names created, related to incorrect error handling for an HTML encoded script.
Paessler Prtg Network Monitor 17.3.33.2830
4.8
CVSSv3
CVE-2017-15008
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all sensor titles, related to incorrect error handling for a %00 in the SRC attribute of an IMG element.
Paessler Prtg Network Monitor 17.3.33.2830
6.1
CVSSv3
CVE-2017-15009
PRTG Network Monitor version 17.3.33.2830 is vulnerable to reflected Cross-Site Scripting on error.htm (the error page), via the errormsg parameter.
Paessler Prtg Network Monitor 17.3.33.2830
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »