Show filters
47 Total Results
Displaying 1-10 of 47
Sort by:
Attacker Value
Very High
CVE-2020-10220
Disclosure Date: March 07, 2020 (last updated February 21, 2025)
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
1
Attacker Value
Very High
CVE-2019-16662
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.
1
Attacker Value
Very High
CVE-2020-10548
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
0
Attacker Value
Very High
CVE-2020-10546
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
0
Attacker Value
Very High
CVE-2020-10547
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
0
Attacker Value
Very High
CVE-2020-10549
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
0
Attacker Value
Moderate
CVE-2019-19585
Disclosure Date: August 08, 2019 (last updated February 21, 2025)
An issue was discovered in rConfig 3.9.3. The install script updates the /etc/sudoers file for rconfig specific tasks. After an "rConfig specific Apache configuration" update, apache has high privileges for some binaries. This can be exploited by an attacker to bypass local security restrictions.
0
Attacker Value
Unknown
CVE-2024-53849
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2023-39110
Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path parameter at /ajaxGetFileByPath.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
0
Attacker Value
Unknown
CVE-2023-39109
Disclosure Date: August 01, 2023 (last updated October 08, 2023)
rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.
0