Show filters
46 Total Results
Displaying 31-40 of 46
Sort by:
Attacker Value
Unknown
CVE-2020-15714
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
0
Attacker Value
Unknown
CVE-2020-15712
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
0
Attacker Value
Unknown
CVE-2020-15715
Disclosure Date: July 28, 2020 (last updated November 28, 2024)
rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
0
Attacker Value
Unknown
CVE-2020-15713
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database.
0
Attacker Value
Unknown
CVE-2020-12255
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
0
Attacker Value
Unknown
CVE-2020-12256
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
0
Attacker Value
Unknown
CVE-2020-12258
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
0
Attacker Value
Unknown
CVE-2020-12257
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to cross-site request forgery (CSRF) because it lacks implementation of CSRF protection such as a CSRF token. An attacker can leverage this vulnerability by creating a form (add a user, delete a user, or edit a user).
0
Attacker Value
Unknown
CVE-2020-12259
Disclosure Date: May 18, 2020 (last updated February 21, 2025)
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
0
Attacker Value
Unknown
CVE-2020-10879
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
0