Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
roxy-wi roxy-wi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-25802
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions before 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a...
Roxy-wi Roxy-wi
NA
CVE-2023-25803
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions before 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0.
Roxy-wi Roxy-wi
NA
CVE-2023-25804
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions before 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test...
Roxy-wi Roxy-wi
10
CVSSv2
CVE-2022-31137
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions before 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from...
Roxy-wi Roxy-wi
1 Github repository
7.5
CVSSv2
CVE-2021-38167
Roxy-WI up to and including 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication.
Roxy-wi Roxy-wi
6.5
CVSSv2
CVE-2021-38169
Roxy-WI up to and including 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.
Roxy-wi Roxy-wi
7.5
CVSSv2
CVE-2022-31125
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated malicious user to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This...
Roxy-wi Roxy-wi
7.5
CVSSv2
CVE-2022-31126
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated malicious user to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-...
Roxy-wi Roxy-wi
6.5
CVSSv2
CVE-2021-38168
Roxy-WI up to and including 5.2.2.0 allows authenticated SQL injection via select_servers.
Roxy-wi Roxy-wi
NA
CVE-2022-31161
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 co...
Roxy-wi Roxy-wi
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-35229
privilege escalation
local users
CVE-2024-5405
CVE-2024-27842
CVE-2024-5274
CVE-2024-5378
CVE-2024-34152
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »