Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Paessler Subscribe
Filtered by product Prtg Network Monitor
Total 27 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-15360 1 Paessler 1 Prtg Network Monitor 2017-11-01 3.5 LOW 5.4 MEDIUM
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all group names created, related to incorrect error handling for an HTML encoded script.
CVE-2017-15651 1 Paessler 1 Prtg Network Monitor 2017-10-31 6.5 MEDIUM 6.7 MEDIUM
PRTG Network Monitor 17.3.33.2830 allows remote authenticated administrators to execute arbitrary code by uploading a .exe file and then proceeding in spite of the error message.
CVE-2017-15009 1 Paessler 1 Prtg Network Monitor 2017-10-12 4.3 MEDIUM 6.1 MEDIUM
PRTG Network Monitor version 17.3.33.2830 is vulnerable to reflected Cross-Site Scripting on error.htm (the error page), via the errormsg parameter.
CVE-2017-15008 1 Paessler 1 Prtg Network Monitor 2017-10-12 3.5 LOW 4.8 MEDIUM
PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all sensor titles, related to incorrect error handling for a %00 in the SRC attribute of an IMG element.
CVE-2017-12879 1 Paessler 1 Prtg Network Monitor 2017-09-11 3.5 LOW 5.4 MEDIUM
Cross-site scripting (XSS-STORED) vulnerability in the DEVICES OR SENSORS functionality in Paessler PRTG Network Monitor before 17.3.33.2654 allows authenticated remote attackers to inject arbitrary web script or HTML.
CVE-2017-9816 1 Paessler 1 Prtg Network Monitor 2017-08-24 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor before 17.2.32.2279 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2015-7743 1 Paessler 1 Prtg Network Monitor 2017-01-25 4.0 MEDIUM 6.5 MEDIUM
XML external entity vulnerability in PRTG Network Monitor before 16.2.23.3077/3078 allows remote authenticated users to read arbitrary files by creating a new HTTP XML/REST Value sensor that accesses a crafted XML file.