Vulnerabilities (CVE)

Filtered by vendor Paessler Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-10374 1 Paessler 1 Prtg Network Monitor 2020-06-25 7.5 HIGH 9.8 CRITICAL
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2018-19410 1 Paessler 1 Prtg Network Monitor 2019-10-03 7.5 HIGH 9.8 CRITICAL
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).