Ajenti

Ajenti

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 19:30:47
  • Zuletzt bearbeitet 21.04.2026 19:29:55

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerabili...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2026 19:29:00
  • Zuletzt bearbeitet 21.04.2026 19:31:16

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerability is fixed in 0.112.

  • EPSS 0.02%
  • Veröffentlicht 06.04.2026 17:51:54
  • Zuletzt bearbeitet 20.04.2026 18:33:23

Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authenticated user (using the auth_users plugin authentication method) could install a custom package even if this user is not superuser. This vulnerability is fixed in 2.2.15.

  • EPSS 0.07%
  • Veröffentlicht 26.02.2026 03:16:05
  • Zuletzt bearbeitet 02.03.2026 17:24:59

Ajenti is a Linux and BSD modular server admin panel. Prior to version 2.2.13, an unauthenticated user could gain access to a server to execute arbitrary code on this server. This is fixed in the version 2.2.13.

Exploit
  • EPSS 0.55%
  • Veröffentlicht 29.01.2026 14:28:28
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting...

Exploit
  • EPSS 77.64%
  • Veröffentlicht 09.06.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 04:39:52

A vulnerability has been found in ajenti 2.1.31 and classified as critical. This vulnerability affects unknown code of the component API. The manipulation leads to privilege escalation. The attack can be initiated remotely. The exploit has been discl...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 13.03.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:44

Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. This attack appears to be exploitable via network co...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 13.03.2018 15:29:01
  • Zuletzt bearbeitet 21.11.2024 03:39:36

Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds wit...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 13.03.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:35

Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. This attack appear to be exploitable via By knowing how the requisition is made, and sen...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 13.03.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:35

Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. This attack appear to be exploitable via An attacker can freeze te server by sending a giant string to the ...