Check CVE Id
Check CWE Id
In Paessler PRTG Network Monitor 184.108.40.20630, it's possible to create a Map as a read-only user, by forging a request and sending it to the server.
(Improper Access Control)
Prtg network monitor
CVSS Base Score
PRTG Network Monitor before 220.127.116.113 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly che...
PRTG Network Monitor before 18.104.22.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' di...
PRTG Network Monitor before 22.214.171.1244 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST paramet...
PRTG Network Monitor before 126.96.36.1992 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.
PRTG Network Monitor 188.8.131.5230 allows remote authenticated administrators to execute arbitrary code by uploading a .exe file and then proceeding in spite of the error message.
PRTG Network Monitor version 184.108.40.20630 is vulnerable to reflected Cross-Site Scripting on error.htm (the error page), via the errormsg parameter.
PRTG Network Monitor version 220.127.116.1130 is vulnerable to stored Cross-Site Scripting on all sensor titles, related to incorrect error handling for a %00 in the SRC attribute of an IMG element.
Back to Top