id
stringlengths
13
16
published
stringlengths
23
23
descriptions
stringlengths
21
4k
metrics
dict
references
listlengths
1
140
configurations
listlengths
1
2.88k
__index_level_0__
int64
0
135k
CVE-2016-10853
2019-08-01T15:15:12.297
cPanel before 11.54.0.4 allows stored XSS in the WHM Feature Manager interface (SEC-86).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,013
CVE-2016-10854
2019-08-01T15:15:12.390
cPanel before 11.54.0.4 allows self XSS in the X3 Entropy Banner interface (SEC-87).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://forums.cpanel.net/threads/cpanel-tsr-2016-0001-full-disclosure.522571/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7EB24A-90DC-4041-9D8D-85E79814A456", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,014
CVE-2016-10855
2019-08-01T15:15:12.483
cPanel before 11.54.0.4 allows unauthenticated arbitrary code execution via cpsrvd (SEC-91).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://forums.cpanel.net/threads/cpanel-tsr-2016-0001-full-disclosure.522571/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B7EB24A-90DC-4041-9D8D-85E79814A456", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,015
CVE-2016-10856
2019-08-01T15:15:12.577
cPanel before 11.54.0.0 allows subaccounts to discover sensitive data through comet feeds (SEC-29).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9A02AA-A447-4AD5-B6B4-0E0104A8E19D", "versionEndExcluding": "11.50.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7E4948-CCFF-459D-8FF6-E385D50A57AD", "versionEndExcluding": "11.52.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAF88E2-FF31-4FAE-A7F0-EF19973A4413", "versionEndExcluding": "11.52.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,016
CVE-2016-10857
2019-08-01T15:15:12.657
cPanel before 11.54.0.0 allows a bypass of the e-mail sending limit (SEC-60).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2015-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9A02AA-A447-4AD5-B6B4-0E0104A8E19D", "versionEndExcluding": "11.50.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7E4948-CCFF-459D-8FF6-E385D50A57AD", "versionEndExcluding": "11.52.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAF88E2-FF31-4FAE-A7F0-EF19973A4413", "versionEndExcluding": "11.52.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,017
CVE-2016-10858
2019-08-01T15:15:12.717
cPanel before 11.54.0.0 allows unauthenticated arbitrary code execution via DNS NS entry poisoning (SEC-64).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://forums.cpanel.net/threads/cpanel-tsr-2015-0006-full-disclosure.510181/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9A02AA-A447-4AD5-B6B4-0E0104A8E19D", "versionEndExcluding": "11.50.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7E4948-CCFF-459D-8FF6-E385D50A57AD", "versionEndExcluding": "11.52.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAF88E2-FF31-4FAE-A7F0-EF19973A4413", "versionEndExcluding": "11.52.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,018
CVE-2016-10859
2019-08-01T15:15:12.780
cPanel before 11.54.0.0 allows unauthorized password changes via Webmail API commands (SEC-65).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2015-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9A02AA-A447-4AD5-B6B4-0E0104A8E19D", "versionEndExcluding": "11.50.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7E4948-CCFF-459D-8FF6-E385D50A57AD", "versionEndExcluding": "11.52.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAF88E2-FF31-4FAE-A7F0-EF19973A4413", "versionEndExcluding": "11.52.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,019
CVE-2016-10860
2019-08-01T15:15:12.857
cPanel before 11.54.0.0 allows unauthorized zone modification via the WHM API (SEC-66).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B899CE76-F4D2-4845-BF2F-5C7E24735526", "versionEndExcluding": "11.48.4.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9A02AA-A447-4AD5-B6B4-0E0104A8E19D", "versionEndExcluding": "11.50.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF7E4948-CCFF-459D-8FF6-E385D50A57AD", "versionEndExcluding": "11.52.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAF88E2-FF31-4FAE-A7F0-EF19973A4413", "versionEndExcluding": "11.52.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,020
CVE-2018-20901
2019-08-01T15:15:12.967
cPanel before 71.9980.37 allows Remote-Stored XSS in WHM Save Theme Interface (SEC-400).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2927869B-A80C-4801-9AB8-078649CD8E38", "versionEndExcluding": "71.9980.37", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,021
CVE-2018-20902
2019-08-01T15:15:13.047
cPanel before 71.9980.37 allows attackers to read root's crontab file by leveraging ClamAV installation (SEC-408).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2927869B-A80C-4801-9AB8-078649CD8E38", "versionEndExcluding": "71.9980.37", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,022
CVE-2018-20903
2019-08-01T15:15:13.107
cPanel before 71.9980.37 allows self XSS in the WHM Backup Configuration interface (SEC-421).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2927869B-A80C-4801-9AB8-078649CD8E38", "versionEndExcluding": "71.9980.37", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,023
CVE-2018-20904
2019-08-01T15:15:13.203
cPanel before 71.9980.37 allows attackers to make API calls that bypass the cron feature restriction (SEC-427).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D3F837-7718-480E-8B21-A9615D5ED1FB", "versionEndExcluding": "62.0.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B95B8-BB4A-4841-B843-26273F1082F2", "versionEndExcluding": "68.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "111BF24F-8605-4E04-B156-85655AD53853", "versionEndExcluding": "70.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,024
CVE-2018-20905
2019-08-01T15:15:13.280
cPanel before 71.9980.37 allows attackers to make API calls that bypass the backup feature restriction (SEC-429).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D3F837-7718-480E-8B21-A9615D5ED1FB", "versionEndExcluding": "62.0.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B95B8-BB4A-4841-B843-26273F1082F2", "versionEndExcluding": "68.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "111BF24F-8605-4E04-B156-85655AD53853", "versionEndExcluding": "70.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "688E88AF-7811-4BD7-89DA-4D9569D0EDB8", "versionEndExcluding": "71.9980.37", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "71.9980.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,025
CVE-2018-20906
2019-08-01T15:15:13.390
cPanel before 71.9980.37 allows attackers to make API calls that bypass the images feature restriction (SEC-430).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D3F837-7718-480E-8B21-A9615D5ED1FB", "versionEndExcluding": "62.0.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B95B8-BB4A-4841-B843-26273F1082F2", "versionEndExcluding": "68.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "111BF24F-8605-4E04-B156-85655AD53853", "versionEndExcluding": "70.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,026
CVE-2018-20907
2019-08-01T15:15:13.467
cPanel before 71.9980.37 does not enforce the Mime::list_hotlinks API feature restriction (SEC-432).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D3F837-7718-480E-8B21-A9615D5ED1FB", "versionEndExcluding": "62.0.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B95B8-BB4A-4841-B843-26273F1082F2", "versionEndExcluding": "68.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "111BF24F-8605-4E04-B156-85655AD53853", "versionEndExcluding": "70.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "688E88AF-7811-4BD7-89DA-4D9569D0EDB8", "versionEndExcluding": "71.9980.37", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "71.9980.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,027
CVE-2018-20908
2019-08-01T15:15:13.547
cPanel before 71.9980.37 allows arbitrary file-read operations during pkgacct custom template handling (SEC-435).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/72+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D3F837-7718-480E-8B21-A9615D5ED1FB", "versionEndExcluding": "62.0.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "394B95B8-BB4A-4841-B843-26273F1082F2", "versionEndExcluding": "68.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "111BF24F-8605-4E04-B156-85655AD53853", "versionEndExcluding": "70.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,028
CVE-2018-20909
2019-08-01T15:15:13.623
cPanel before 70.0.23 allows arbitrary file-chmod operations during legacy incremental backups (SEC-338).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,029
CVE-2018-20910
2019-08-01T15:15:13.703
cPanel before 70.0.23 allows self XSS in the WHM cPAddons showsecurity Interface (SEC-357).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,030
CVE-2018-20911
2019-08-01T15:15:13.763
cPanel before 70.0.23 allows code execution because "." is in @INC during a Perl syntax check of cpaddonsup (SEC-359).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,031
CVE-2018-20912
2019-08-01T15:15:13.827
cPanel before 70.0.23 allows demo accounts to execute code via awstats (SEC-362).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,032
CVE-2018-20913
2019-08-01T15:15:13.890
cPanel before 70.0.23 allows attackers to read the root accesshash via the WHM /cgi/trustclustermaster.cgi (SEC-364).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,033
CVE-2018-20914
2019-08-01T15:15:13.967
In cPanel before 70.0.23, OpenID providers can inject arbitrary data into cPanel session files (SEC-368).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,034
CVE-2018-20915
2019-08-01T15:15:14.047
cPanel before 70.0.23 allows stored XSS via a WHM Edit DNS Zone action (SEC-369).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,035
CVE-2018-20916
2019-08-01T15:15:14.093
cPanel before 70.0.23 allows Stored XSS via a WHM Edit MX Entry (SEC-370).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,036
CVE-2018-20917
2019-08-01T15:15:14.203
cPanel before 70.0.23 allows any user to disable Solr (SEC-371).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,037
CVE-2018-20918
2019-08-01T15:15:14.280
cPanel before 70.0.23 allows stored XSS in WHM DNS Cluster (SEC-372).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,038
CVE-2018-20919
2019-08-01T15:15:14.357
cPanel before 70.0.23 allows stored XSS via a WHM Create Account action (SEC-373).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,039
CVE-2018-20920
2019-08-01T15:15:14.437
cPanel before 70.0.23 allows stored XSS via a WHM Edit DNS Zone action (SEC-374).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,040
CVE-2018-20921
2019-08-01T15:15:14.500
cPanel before 70.0.23 allows stored XSS via a WHM "Delete a DNS Zone" action (SEC-375).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,041
CVE-2018-20922
2019-08-01T15:15:14.593
cPanel before 70.0.23 allows stored XSS via a WHM DNS Cleanup action (SEC-376).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,042
CVE-2018-20923
2019-08-01T15:15:14.670
cPanel before 70.0.23 allows stored XSS via a WHM Synchronize DNS Records action (SEC-377).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67363616-6DDB-4210-A24D-EF56C0EBD8ED", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,043
CVE-2019-13572
2019-08-01T15:15:14.843
The Adenion Blog2Social plugin through 5.5.0 for WordPress allows SQL Injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-094" }, { "source": "[email protected]", "tags": [ "Patch" ], "url": "https://plugins.trac.wordpress.org/changeset/2126559/blog2social/trunk/includes/Ajax/Get.php" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://wpvulndb.com/vulnerabilities/9476" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1E743110-6004-4378-9012-BDC0B60AC7BE", "versionEndExcluding": null, "versionEndIncluding": "5.5.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,044
CVE-2019-14259
2019-08-01T15:15:14.937
On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:polycom:obihai_obi1022:-:*:*:*:*:*:*:*", "matchCriteriaId": "21B72C2A-CE0A-41A2-834A-EE4509980693", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:polycom:obihai_obi1022_firmware:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "444CB461-2E6D-4792-A178-08E45D4DFF9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
10,045
CVE-2019-14471
2019-08-01T15:15:15.000
TestLink 1.9.19 has XSS via the error.php message parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://code610.blogspot.com/2019/07/xss-in-testlink-1919.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:testlink:testlink:1.9.19:*:*:*:*:*:*:*", "matchCriteriaId": "19315A39-A5B5-4829-A396-A79E2AA0CFC5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,046
CVE-2019-14472
2019-08-01T15:15:15.077
Zurmo 3.2.7-2 has XSS via the app/index.php/zurmo/default PATH_INFO.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://code610.blogspot.com/2019/07/xss-in-zurmo-crm.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zurmo:zurmo:3.2.7-2:*:*:*:*:*:*:*", "matchCriteriaId": "E5BE9832-7658-4E2B-B7FD-44D3A525C0AE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,047
CVE-2016-10836
2019-08-01T16:15:12.163
cPanel before 55.9999.141 allows arbitrary file-read operations during authentication with caldav (SEC-108).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,048
CVE-2016-10837
2019-08-01T16:15:12.240
cPanel before 11.54.0.4 allows arbitrary code execution because of an unsafe @INC path (SEC-46).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,049
CVE-2016-10838
2019-08-01T16:15:12.350
cPanel before 11.54.0.4 allows arbitrary file-read operations via the bin/fmq script (SEC-70).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,050
CVE-2016-10839
2019-08-01T16:15:12.413
cPanel before 11.54.0.4 allows SQL injection in bin/horde_update_usernames (SEC-71).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,051
CVE-2016-10840
2019-08-01T16:15:12.460
cPanel before 11.54.0.4 allows arbitrary code execution during locale duplication (SEC-72).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,052
CVE-2016-10841
2019-08-01T16:15:12.537
The bin/mkvhostspasswd script in cPanel before 11.54.0.4 discloses password hashes (SEC-73).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,053
CVE-2016-10842
2019-08-01T16:15:12.600
cPanel before 11.54.0.4 allows certain file-read operations in bin/setup_global_spam_filter.pl (SEC-74).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,054
CVE-2016-10843
2019-08-01T16:15:12.663
cPanel before 11.54.0.4 allows code execution in the context of shared users via JSON-API (SEC-76).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,055
CVE-2016-10844
2019-08-01T16:15:13.007
The chcpass script in cPanel before 11.54.0.4 reveals a password hash (SEC-77).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,056
CVE-2016-10845
2019-08-01T16:15:13.070
cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/check_system_storable (SEC-78).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,057
CVE-2016-10846
2019-08-01T16:15:13.147
cPanel before 11.54.0.4 allows arbitrary file-chown and file-chmod operations during Roundcube database conversions (SEC-79).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,058
CVE-2016-10847
2019-08-01T16:15:13.210
cPanel before 11.54.0.4 allows arbitrary file-read and file-write operations via scripts/fixmailboxpath (SEC-80).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,059
CVE-2016-10848
2019-08-01T16:15:13.273
cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/quotacheck (SEC-81).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,060
CVE-2016-10849
2019-08-01T16:15:13.337
cPanel before 11.54.0.4 allows certain file-chmod operations in scripts/secureit (SEC-82).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/54+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5551CB50-D374-47FE-9E81-7861238613CB", "versionEndExcluding": "11.48.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.48.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "94940D22-4AC3-410A-8129-867C109B4C88", "versionEndExcluding": "11.50.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "41124091-A91C-405B-A3E3-FB89ABF53CBC", "versionEndExcluding": "11.52.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0587BD-B593-4A38-A0AC-7F027290594A", "versionEndExcluding": "11.54.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,061
CVE-2018-20924
2019-08-01T16:15:13.443
cPanel before 70.0.23 allows arbitrary file-read and file-unlink operations via WHM style uploads (SEC-378).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 7.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:C/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,062
CVE-2018-20925
2019-08-01T16:15:13.490
cPanel before 70.0.23 allows local privilege escalation via the WHM Legacy Language File Upload interface (SEC-379).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,063
CVE-2018-20926
2019-08-01T16:15:13.553
cPanel before 70.0.23 allows local privilege escalation via the WHM Locale XML Upload interface (SEC-380).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,064
CVE-2018-20927
2019-08-01T16:15:13.633
cPanel before 70.0.23 allows jailshell escape because of incorrect crontab parsing (SEC-382).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,065
CVE-2018-20928
2019-08-01T16:15:13.677
cPanel before 70.0.23 allows stored XSS via the cpaddons vendor interface (SEC-391).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,066
CVE-2018-20929
2019-08-01T16:15:13.773
cPanel before 70.0.23 allows an open redirect via the /unprotected/redirect.html endpoint (SEC-392).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,067
CVE-2018-20930
2019-08-01T16:15:13.837
cPanel before 70.0.23 allows .htaccess restrictions bypass when Htaccess Optimization is enabled (SEC-401).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,068
CVE-2018-20931
2019-08-01T16:15:13.913
cPanel before 70.0.23 allows demo accounts to execute code via the Landing Page (SEC-405).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,069
CVE-2018-20932
2019-08-01T16:15:13.990
cPanel before 70.0.23 exposes Apache HTTP Server logs after creation of certain domains (SEC-406).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,070
CVE-2018-20933
2019-08-01T16:15:14.070
cPanel before 70.0.23 has Stored XSS via an WHM Edit DNS Zone action (SEC-410).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,071
CVE-2018-20934
2019-08-01T16:15:14.147
cPanel before 70.0.23 does not prevent e-mail account suspensions from being applied to unowned accounts (SEC-411).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4705455-5EC7-4866-B39C-9A4A8C7E997C", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.122", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,072
CVE-2018-20935
2019-08-01T16:15:14.240
cPanel before 70.0.23 allows stored XSS in via a WHM "Reset a DNS Zone" action (SEC-412).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "58CDDB1F-721D-4700-BA1C-77A92EDD0B98", "versionEndExcluding": "62.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B35C1C8-1313-4EA7-B7DA-72EF53B9D9AB", "versionEndExcluding": "68.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE17C627-68A7-40AC-88E6-45EF6C5F8298", "versionEndExcluding": "70.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "69.9999.125", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,073
CVE-2019-14486
2019-08-01T16:15:14.413
GnuCOBOL 2.2 has a buffer overflow in cb_evaluate_expr in cobc/field.c via crafted COBOL source code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://sourceforge.net/p/open-cobol/bugs/582/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnucobol_project:gnucobol:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B77EB056-4A0B-4FD6-9B09-F83FF20C691B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,074
CVE-2016-10822
2019-08-01T17:15:11.267
cPanel before 55.9999.141 allows self XSS in X3 Reseller Branding Images (SEC-88).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,075
CVE-2016-10823
2019-08-01T17:15:11.343
cPanel before 55.9999.141 allows arbitrary code execution in the context of the root account because of MakeText interpolation (SEC-89).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,076
CVE-2016-10824
2019-08-01T17:15:11.423
cPanel before 55.9999.141 allows unauthenticated arbitrary code execution via DNS NS entry poisoning (SEC-90).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,077
CVE-2016-10825
2019-08-01T17:15:11.483
cPanel before 55.9999.141 allows attackers to bypass a Security Policy by faking static documents (SEC-92).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,078
CVE-2016-10827
2019-08-01T17:15:11.547
cPanel before 55.9999.141 allows self stored XSS in WHM Edit System Mail Preferences (SEC-96).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,079
CVE-2016-10828
2019-08-01T17:15:11.627
cPanel before 55.9999.141 allows arbitrary code execution because of an unsafe @INC path (SEC-97).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,080
CVE-2016-10829
2019-08-01T17:15:11.687
cPanel before 55.9999.141 allows arbitrary file-read operations because of a multipart form processing error (SEC-99).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,081
CVE-2016-10830
2019-08-01T17:15:11.767
cPanel before 55.9999.141 allows ACL bypass for AppConfig applications via magic_revision (SEC-100).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,082
CVE-2016-10831
2019-08-01T17:15:11.827
cPanel before 55.9999.141 does not perform as two-factor authentication check when possessing another account (SEC-101).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,083
CVE-2016-10832
2019-08-01T17:15:11.907
cPanel before 55.9999.141 allows FTP cPHulk bypass via account name munging (SEC-102).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,084
CVE-2016-10833
2019-08-01T17:15:11.970
cPanel before 55.9999.141 mishandles username-based blocking for PRE requests in cPHulkd (SEC-104).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,085
CVE-2016-10834
2019-08-01T17:15:12.063
cPanel before 55.9999.141 allows account-suspension bypass via ftp (SEC-105).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,086
CVE-2016-10835
2019-08-01T17:15:12.127
cPanel before 55.9999.141 allows a POP/IMAP cPHulk bypass via account name munging (SEC-107).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7EA0B13-FD55-406C-A2F8-0131776B4229", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07669A4-F8F7-4C24-AB49-C674E57AC3EA", "versionEndExcluding": "55.9999.141", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,087
CVE-2018-20936
2019-08-01T17:15:12.233
cPanel before 68.0.27 allows attackers to read the SRS secret via exim.conf (SEC-308).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,088
CVE-2018-20937
2019-08-01T17:15:12.297
cPanel before 68.0.27 does not validate database and dbuser names during renames (SEC-321).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,089
CVE-2018-20938
2019-08-01T17:15:12.360
cPanel before 68.0.27 does not enforce ownership during addpkgext and delpkgext WHM API calls (SEC-324).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,090
CVE-2018-20939
2019-08-01T17:15:12.423
cPanel before 68.0.27 allows a user to discover contents of directories (that are not owned by that user) by leveraging backups (SEC-339).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,091
CVE-2018-20940
2019-08-01T17:15:12.517
cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon the enabling of backups (SEC-342).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,092
CVE-2018-20941
2019-08-01T17:15:12.577
cPanel before 68.0.27 allows arbitrary file-read operations via restore adminbin (SEC-349).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,093
CVE-2018-20942
2019-08-01T17:15:12.657
cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon configuring crontab (SEC-351).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,094
CVE-2018-20943
2019-08-01T17:15:12.720
cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon a post-update task (SEC-352).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,095
CVE-2018-20944
2019-08-01T17:15:12.780
cPanel before 68.0.27 allows attackers to read a copy of httpd.conf that is created during a syntax test (SEC-353).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,096
CVE-2018-20945
2019-08-01T17:15:12.843
bin/csvprocess in cPanel before 68.0.27 allows insecure file operations (SEC-354).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,097
CVE-2018-20946
2019-08-01T17:15:12.890
cPanel before 68.0.27 allows attackers to read zone information because a world-readable archive is created by the archive_sync_zones script (SEC-355).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,098
CVE-2018-20947
2019-08-01T17:15:12.970
cPanel before 68.0.27 allows certain file-write operations via the telnetcrt script (SEC-356).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,099
CVE-2018-20948
2019-08-01T17:15:13.030
cPanel before 68.0.27 allows self XSS in cPanel Backup Restoration (SEC-383).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,100
CVE-2018-20949
2019-08-01T17:15:13.110
cPanel before 68.0.27 allows self XSS in WHM Apache Configuration Include Editor (SEC-385).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,101
CVE-2018-20950
2019-08-01T17:15:13.173
cPanel before 68.0.27 allows self stored XSS in WHM Account Transfer (SEC-386).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,102
CVE-2018-20951
2019-08-01T17:15:13.250
cPanel before 68.0.27 allows self XSS in WHM Spamd Startup Config (SEC-387).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2018-0001-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,103
CVE-2018-20952
2019-08-01T17:15:13.313
cPanel before 68.0.27 creates world-readable files during use of WHM Apache Includes Editor (SEC-388).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,104
CVE-2018-20953
2019-08-01T17:15:13.377
cPanel before 68.0.27 allows self XSS in the WHM listips interface (SEC-389).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4A4E3F1-3C13-4958-B459-5EDC57CD9C58", "versionEndExcluding": "62.0.39", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "614031BF-1524-4E1C-B6CB-B99944A8145C", "versionEndExcluding": "66.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "328117AC-A34F-4D57-A697-E1E68C2A92E3", "versionEndExcluding": "68.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,105
CVE-2019-14491
2019-08-01T17:15:13.453
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1. There is an out of bounds read in the function cv::predictOrdered<cv::HaarEvaluator> in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/compare/33b765d...4a7ca5a" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/compare/371bba8...ddbd10c" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15125" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "218BB784-3C67-4D96-846B-02970872D450", "versionEndExcluding": "3.4.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB2D0E5-490D-4315-972B-936A2877C4DB", "versionEndExcluding": "4.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,106
CVE-2019-14492
2019-08-01T17:15:13.530
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1. There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/compare/33b765d...4a7ca5a" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/compare/371bba8...ddbd10c" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "218BB784-3C67-4D96-846B-02970872D450", "versionEndExcluding": "3.4.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEB2D0E5-490D-4315-972B-936A2877C4DB", "versionEndExcluding": "4.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,107
CVE-2019-14493
2019-08-01T17:15:13.593
An issue was discovered in OpenCV before 4.1.1. There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/compare/371bba8...ddbd10c" }, { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencv/opencv/issues/15127" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:*", "matchCriteriaId": "B00DAA9A-1738-491E-9220-BFFB8580CAB4", "versionEndExcluding": "4.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,108
CVE-2019-14494
2019-08-01T17:15:13.673
An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.freedesktop.org/poppler/poppler/issues/802" }, { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://gitlab.freedesktop.org/poppler/poppler/merge_requests/317" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AHYAM32PALHQXL3O4DKIJ3EJB6AKBOVC/" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLAQBLBIIL3A5XZQYR4MG3Z4LIPIC42P/" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4091-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E495365-0100-4946-A7BA-D4CBD1EA45EF", "versionEndExcluding": null, "versionEndIncluding": "0.78.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,109
CVE-2019-14495
2019-08-01T17:15:13.733
webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.3, "impactScore": 4, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Patch" ], "url": "https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865" }, { "source": "[email protected]", "tags": [ "Patch" ], "url": "https://github.com/z3APA3A/3proxy/compare/0.8.12...0.8.13" }, { "source": "[email protected]", "tags": [ "Release Notes" ], "url": "https://github.com/z3APA3A/3proxy/releases/tag/0.8.13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:3proxy:3proxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4B94B96-2D89-4293-BD16-28479B164F38", "versionEndExcluding": "0.8.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,110
CVE-2019-9140
2019-08-01T17:15:13.937
When processing Deeplink scheme, Happypoint mobile app 6.3.19 and earlier versions doesn't check Deeplink URL correctly. This could lead to javascript code execution, url redirection, sensitive information disclosure. An attacker can exploit this issue by enticing an unsuspecting user to open a specific malicious URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35103" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:happypointcard:happypoint:6.3.19:*:*:*:*:android:*:*", "matchCriteriaId": "4124FBA8-3013-4D1F-BCEF-5EBE64E6A41F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,111
CVE-2019-14496
2019-08-01T18:15:11.350
LoaderXM::load in LoaderXM.cpp in milkyplay in MilkyTracker 1.02.00 has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/milkytracker/MilkyTracker/issues/183" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00029.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00023.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4499-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:milkytracker_project:milkytracker:1.02.00:*:*:*:*:*:*:*", "matchCriteriaId": "BFF6C428-469E-487E-A0AB-1719FCFD37E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,112