CVE-2023-31452
- EPSS 1.13%
- Veröffentlicht 09.08.2023 12:15:09
- Zuletzt bearbeitet 21.11.2024 08:01:53
A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and earlier versions that allows remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is ind...
CVE-2022-35739
- EPSS 1.17%
- Veröffentlicht 25.10.2022 17:15:54
- Zuletzt bearbeitet 07.05.2025 21:15:54
PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) ...
CVE-2021-29643
- EPSS 0.3%
- Veröffentlicht 13.09.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:01:33
PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.
CVE-2021-34547
- EPSS 0.14%
- Veröffentlicht 10.06.2021 15:15:09
- Zuletzt bearbeitet 21.11.2024 06:10:38
PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.
CVE-2021-27220
- EPSS 0.37%
- Veröffentlicht 31.03.2021 22:15:14
- Zuletzt bearbeitet 21.11.2024 05:57:37
An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
CVE-2020-14073
- EPSS 0.25%
- Veröffentlicht 23.06.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 05:02:33
XSS exists in PRTG Network Monitor 20.1.56.1574 via crafted map properties. An attacker with Read/Write privileges can create a map, and then use the Map Designer Properties screen to insert JavaScript code. This can be exploited against any user wit...
CVE-2020-11547
- EPSS 87.33%
- Veröffentlicht 05.04.2020 00:15:11
- Zuletzt bearbeitet 21.11.2024 04:58:07
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by typ...
CVE-2020-10374
- EPSS 4.89%
- Veröffentlicht 30.03.2020 22:15:15
- Zuletzt bearbeitet 21.11.2024 04:55:10
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
- EPSS 3.72%
- Veröffentlicht 17.03.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:20:29
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insuf...
- EPSS 12.68%
- Veröffentlicht 16.03.2020 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:20:29
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vu...