CVE-2018-18551
- EPSS 0.23%
- Veröffentlicht 24.10.2018 22:29:01
- Zuletzt bearbeitet 21.11.2024 03:56:08
ServersCheck Monitoring Software through 14.3.3 has Persistent and Reflected XSS via the sensors.html status parameter, sensors.html type parameter, sensors.html device parameter, report.html location parameter, group_delete.html group parameter, rep...
CVE-2018-18552
- EPSS 2.2%
- Veröffentlicht 24.10.2018 22:29:01
- Zuletzt bearbeitet 21.11.2024 03:56:08
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, t...
CVE-2017-17832
- EPSS 0.22%
- Veröffentlicht 27.12.2017 17:08:19
- Zuletzt bearbeitet 20.04.2025 01:37:25
ServersCheck Monitoring Software before 14.2.3 is prone to a cross-site scripting vulnerability as user supplied-data is not validated/sanitized when passed in the settings_SMS_ALERT_TYPE parameter, and JavaScript can be executed on settings-save.htm...
- EPSS 0.24%
- Veröffentlicht 29.05.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in ServersCheck Monitoring Software 5.9.0 to 5.10.0 allows remote attackers to read arbitrary files via .. (dot dot) sequences in an HTTP request.