Roxy-Wi 漏洞列表
共找到 8 个与 Roxy-Wi 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2022-31137: Roxy-Wi options.py 远程命令执行漏洞 POC
Roxy-Wi options.py 存在远程命令执行漏洞,攻击者通过漏洞可以执行命令获取服务器权限 app="HAProxy-WI" -
CVE-2022-31126: Roxy-WI - Remote Code Execution POC
Roxy-WI before 6.1.1.0 is susceptible to remote code execution. System commands can be run remotely via the ssh_command function without processing the inputs received from the user in the /app/funct.py file. -
CVE-2022-31137: Roxy-WI < 6.1.1.0 - Remote Code Execution POC
Roxy-WI before 6.1.1.0 is susceptible to remote code execution. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. -
CVE-2022-31161: Roxy-WI - Remote Code Execution POC
Roxy-WI before 6.1.1.0 is susceptible to remote code execution. System commands can be run remotely via the delcert parameter without proper input validation in the /app/options.py file, allowing attackers to inject arbitrary OS commands. -
Roxy-WI CVE-2022-31137 远程命令执行漏洞 无POC
Roxy-WI 是一个用于管理 Haproxy、Nginx、Apache 和 Keepalived 服务器的 Web 界面。Roxy-WI 6.1.1.0 之前的版本存在远程代码执行漏洞。攻击者可以通过/app/options.py远程执行任意命令。 -
Roxy-wi CVE-2022-31126 远程代码执行漏洞 无POC
Roxy-wi before 6.1.1.0 存在远程代码执行漏洞。此漏洞是ssh_command 函数校验不正确导致的。 -
Roxy-WI CVE-2023-29004目录遍历漏洞 无POC
-
Roxy-Wi options.py 远程命令执行漏洞(CVE-2022-31137) 无POC
Roxy-WI是开源的一款用于管理Haproxy、Nginx 和Keepalived 服务器的Web 界面。Roxy-Wi options.py存在远程命令执行漏洞,攻击者通过漏洞可以执行命令获取服务器权限