Rconfig

Rconfig

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.94%
  • Veröffentlicht 19.10.2020 13:15:13
  • Zuletzt bearbeitet 21.11.2024 05:01:50

rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.

  • EPSS 2.93%
  • Veröffentlicht 28.07.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:05

rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.

  • EPSS 0.4%
  • Veröffentlicht 28.07.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:05

rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete informa...

  • EPSS 0.4%
  • Veröffentlicht 28.07.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:04

rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the ba...

  • EPSS 0.12%
  • Veröffentlicht 28.07.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:04

rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path pa...

Exploit
  • EPSS 92.99%
  • Veröffentlicht 04.06.2020 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:33

rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devi...

Exploit
  • EPSS 92.75%
  • Veröffentlicht 04.06.2020 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:33

rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devic...

Exploit
  • EPSS 89.97%
  • Veröffentlicht 04.06.2020 04:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:33

rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monito...

Exploit
  • EPSS 91.39%
  • Veröffentlicht 04.06.2020 04:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:33

rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored ne...

Exploit
  • EPSS 54.9%
  • Veröffentlicht 18.05.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:23

rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.