9.8
CVE-2020-10374
- EPSS 4.89%
- Veröffentlicht 30.03.2020 22:15:15
- Zuletzt bearbeitet 21.11.2024 04:55:10
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paessler ≫ Prtg Network Monitor Version >= 19.2.50 <= 20.1.56
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 4.89% | 0.894 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.