Vulnerabilities (CVE)

Filtered by vendor Rconfig Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-29006 1 Rconfig 1 Rconfig 2021-10-16 4.0 MEDIUM 6.5 MEDIUM
rConfig 3.9.6 is affected by a Local File Disclosure vulnerability. An authenticated user may successfully download any file on the server.
CVE-2020-25353 1 Rconfig 1 Rconfig 2021-08-24 4.0 MEDIUM 6.5 MEDIUM
A server-side request forgery (SSRF) vulnerability in rConfig 3.9.5 has been fixed for 3.9.6. This vulnerability allowed remote authenticated attackers to open a connection to the machine via the deviceIpAddr and connPort parameters.
CVE-2020-25351 1 Rconfig 1 Rconfig 2021-08-23 4.0 MEDIUM 6.5 MEDIUM
An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.
CVE-2020-25352 1 Rconfig 1 Rconfig 2021-08-23 3.5 LOW 5.4 MEDIUM
A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving.
CVE-2020-15712 1 Rconfig 1 Rconfig 2020-07-28 4.0 MEDIUM 4.3 MEDIUM
rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded "dot dot" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system.
CVE-2020-12256 1 Rconfig 1 Rconfig 2020-05-18 3.5 LOW 5.4 MEDIUM
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
CVE-2020-12259 1 Rconfig 1 Rconfig 2020-05-18 3.5 LOW 5.4 MEDIUM
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.