CVSS Base Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Detection Type: exploit
Solution Type: Mitigation
Summary: rConfig is prone to an unauthenticated remote code execution vulnerability in
Detection Method: Sends a crafted HTTP GET request and checks the response.
Affected Versions: rConfig version 3.9.2 and prior.
Recommendations: Delete the install directory as proposed in the installation guide.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Windows)
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Linux)
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Mac OS X)
Adobe Bridge CC Security Updates (apsb19-53)-Mac OS X
Adobe Media Encoder Security Updates(APSB19-52)-Windows
Adobe Bridge CC Security Updates (apsb19-53)-Windows
Adobe Animate Privilege Escalation Vulnerability-Windows (apsb19-34)
Adobe Illustrator Multiple Vulnerabilities-Windows (apsb19-36)
Fedora Update for putty FEDORA-2019-f0d1f795c7
Fedora Update for kernel-tools FEDORA-2019-7a3fc17778
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.