CVSS Base Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Detection Type: exploit
Solution Type: Mitigation
Summary: rConfig is prone to an unauthenticated remote code execution vulnerability in
Detection Method: Sends a crafted HTTP GET request and checks the response.
Affected Versions: rConfig version 3.9.2 and prior.
Recommendations: Delete the install directory as proposed in the installation guide.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Fedora Update for community-mysql FEDORA-2019-c1fab3f139
Fedora Update for java-latest-openjdk FEDORA-2019-119312dbfc
Fedora Update for golang FEDORA-2019-34e097c66c
Fedora Update for community-mysql FEDORA-2019-48a0a07033
Fedora Update for aspell FEDORA-2019-73919e71f8
Fedora Update for crun FEDORA-2019-80a2646798
Fedora Update for mupdf FEDORA-2019-10f02ad597
Debian LTS Advisory ([SECURITY] [DLA 1988-1] ampache security update)
Debian Security Advisory DSA 4562-1 (chromium - security update)
Smartweares HOME easy Information Disclosure Vulnerability
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.