CVE-2022-31161
- EPSS 73.01%
- Veröffentlicht 15.07.2022 21:15:08
- Zuletzt bearbeitet 21.11.2024 07:04:01
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/optio...
- EPSS 93.97%
- Veröffentlicht 08.07.2022 20:15:07
- Zuletzt bearbeitet 21.11.2024 07:03:58
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without pro...
CVE-2022-31126
- EPSS 89.95%
- Veröffentlicht 06.07.2022 18:15:19
- Zuletzt bearbeitet 21.11.2024 07:03:57
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py ...
CVE-2022-31125
- EPSS 18.22%
- Veröffentlicht 06.07.2022 18:15:19
- Zuletzt bearbeitet 21.11.2024 07:03:56
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially cr...
CVE-2021-38167
- EPSS 0.85%
- Veröffentlicht 07.08.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:16:32
Roxy-WI through 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication.
CVE-2021-38169
- EPSS 3.97%
- Veröffentlicht 07.08.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:16:33
Roxy-WI through 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.
CVE-2021-38168
- EPSS 0.41%
- Veröffentlicht 07.08.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:16:32
Roxy-WI through 5.2.2.0 allows authenticated SQL injection via select_servers.