Show filters
46 Total Results
Displaying 41-46 of 46
Sort by:
Attacker Value
Unknown
CVE-2020-9425
Disclosure Date: March 20, 2020 (last updated February 21, 2025)
An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
0
Attacker Value
Unknown
CVE-2020-10221
Disclosure Date: March 08, 2020 (last updated February 21, 2025)
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
0
Attacker Value
Unknown
CVE-2019-19509
Disclosure Date: January 06, 2020 (last updated February 21, 2025)
An issue was discovered in rConfig 3.9.3. A remote authenticated user can directly execute system commands by sending a GET request to ajaxArchiveFiles.php because the path parameter is passed to the exec function without filtering, which can lead to command execution.
0
Attacker Value
Unknown
CVE-2019-19372
Disclosure Date: November 28, 2019 (last updated November 08, 2023)
A downloadFile.php download_file path traversal vulnerability in rConfig through 3.9.3 allows attackers to list files in arbitrary folders and potentially download files. NOTE: the discoverer later reported that there was not a "fully working exploit.
0
Attacker Value
Unknown
CVE-2019-19207
Disclosure Date: November 21, 2019 (last updated November 27, 2024)
rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
0
Attacker Value
Unknown
CVE-2019-16663
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.
0