Roxy-wi

Roxy-wi

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS -
  • Veröffentlicht 20.04.2026 20:26:52
  • Zuletzt bearbeitet 20.04.2026 21:16:34

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. In versions up to and including 8.2.8.2, when LDAP authentication is enabled, Roxy-WI constructs an LDAP search filter by directly concatenating the user-supplied ...

  • EPSS -
  • Veröffentlicht 20.04.2026 20:24:15
  • Zuletzt bearbeitet 20.04.2026 21:16:34

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the POST /config/<service>/show API endpoint accepts a configver parameter that is directly appended to a base directory path to construc...

Exploit
  • EPSS 1.04%
  • Veröffentlicht 17.03.2026 23:43:05
  • Zuletzt bearbeitet 19.03.2026 18:00:58

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare/<service>/<server_ip>/show` endpoint, allowed authenticated users to exe...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 15.01.2026 16:27:52
  • Zuletzt bearbeitet 18.02.2026 17:38:54

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. The...

  • EPSS 4.23%
  • Veröffentlicht 03.01.2025 22:15:06
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os comm...

Exploit
  • EPSS 2.2%
  • Veröffentlicht 29.08.2024 17:15:08
  • Zuletzt bearbeitet 06.09.2024 22:57:01

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. An OS Command Injection vulnerability allows any authenticated user on the application to execute arbitrary code on the web application server via port scanning fu...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 17.04.2023 19:15:07
  • Zuletzt bearbeitet 21.11.2024 07:56:22

hap-wi/roxy-wi is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A Path Traversal vulnerability was found in the current version of Roxy-WI (6.3.9.0 at the moment of writing this report). The vulnerability can be exploite...

Exploit
  • EPSS 0.83%
  • Veröffentlicht 15.03.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:50:14

Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a ...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 13.03.2023 20:15:15
  • Zuletzt bearbeitet 21.11.2024 07:50:13

Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0.

Exploit
  • EPSS 1.45%
  • Veröffentlicht 13.03.2023 20:15:14
  • Zuletzt bearbeitet 21.11.2024 07:50:13

Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a se...