Simple wireless AP setup and mangement for Debian-based devices
100%
Total Score
100
100
100
| Title | Versions | Severity |
|---|---|---|
CVE-2026-24788 billz/raspap-webgui is vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in versions 0.0.0 - 3.3.6. | 0.0.0 - 3.3.6 | High |
CVE-2025-44163 billz/raspap-webgui is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in versions 0.0.0 - 3.3.6. | 0.0.0 - 3.3.6 | High |
CVE-2024-41637 billz/raspap-webgui is vulnerable to Improper Neutralization of Special Elements used in a Command ('Command Injection') in versions 0.0.0 - 3.1.4. | 0.0.0 - 3.1.4 | Critical |
CVE-2022-39987 billz/raspap-webgui is vulnerable to Improper Neutralization of Special Elements used in a Command ('Command Injection') in versions 2.8.0 - 2.9.5. | 2.8.0 - 2.9.5 | High |
CVE-2022-39986 billz/raspap-webgui is vulnerable to Improper Neutralization of Special Elements used in a Command ('Command Injection') in versions 2.8.0 - 2.8.8. | 2.8.0 - 2.8.8 | Critical |
| Dependency | Last Release | Score |
|---|---|---|
phpoption/phpoption Version ^1.9 | — | — |
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant