Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Two unpatched RCE flaws in rConfig software expose servers to hack
- This topic has 0 replies, 1 voice, and was last updated 1 year, 2 months ago by .
-
Topic
-
A cyber security expert named; Mohammad Askar, discovered two remote code execution vulnerabilities in rConfig. The first could be exploited by a remote unauthenticated user, and the second could be exploited by an authenticated user. Admins are now recommended to temporarily uninstall the software, until the issues are resolved. https://securityaffairs.co/wordpress/93391/hacking/rconfig-rce-flaws.html
You must be logged in to reply to this topic.