Rclone

Rclone

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 9.6%
  • Veröffentlicht 23.04.2026 00:03:36
  • Zuletzt bearbeitet 20.05.2026 02:16:35

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and acce...

Exploit
  • EPSS 6.3%
  • Veröffentlicht 22.04.2026 23:57:54
  • Zuletzt bearbeitet 27.04.2026 18:19:45

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC opti...

  • EPSS 0.03%
  • Veröffentlicht 15.11.2024 18:15:30
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modi...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 19.11.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:23:18

An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on th...

  • EPSS 0.32%
  • Veröffentlicht 27.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:46:04

In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Clo...