Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown

CVE-2020-14162

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
Attacker Value
Unknown

CVE-2020-12620

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
Pi-hole 4.4 allows a user able to write to /etc/pihole/dns-servers.conf to escalate privileges through command injection (shell metacharacters after an IP address).
Attacker Value
Unknown

CVE-2020-14971

Disclosure Date: June 23, 2020 (last updated February 21, 2025)
Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.
Attacker Value
Unknown

CVE-2020-8816

Disclosure Date: May 29, 2020 (last updated February 21, 2025)
Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.
Attacker Value
Unknown

CVE-2019-13051

Disclosure Date: October 09, 2019 (last updated November 27, 2024)
Pi-Hole 4.3 allows Command Injection.