id
stringlengths
13
16
published
stringlengths
23
23
descriptions
stringlengths
21
4k
metrics
dict
references
listlengths
1
140
configurations
listlengths
1
2.88k
__index_level_0__
int64
0
135k
CVE-2019-14497
2019-08-01T18:15:11.413
ModuleEditor::convertInstrument in tracker/ModuleEditor.cpp in MilkyTracker 1.02.00 has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/milkytracker/MilkyTracker/issues/182" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00029.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00023.html" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4499-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:milkytracker_project:milkytracker:1.02.00:*:*:*:*:*:*:*", "matchCriteriaId": "BFF6C428-469E-487E-A0AB-1719FCFD37E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,113
CVE-2016-10813
2019-08-01T19:15:12.673
cPanel before 57.9999.54 allows self XSS during ftp account creation under addon domains (SEC-118).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7965732-3FD2-415F-A698-3CFE5F74024F", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D01461E-2FCC-476C-8DA1-D353501A3502", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF56A6AB-6824-4342-BB01-9E693DE90821", "versionEndExcluding": "57.9999.54", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,114
CVE-2016-10814
2019-08-01T19:15:13.143
cPanel before 57.9999.54 allows demo-mode escape via show_template.stor (SEC-119).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177C99D-46D6-4634-B716-84396FFBAAFA", "versionEndExcluding": "11.50.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "05439744-CE36-4417-AD79-75C030D14CF0", "versionEndExcluding": "11.52.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.51.9999.98", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E5B5B5-42B0-4C5F-B354-C9845CE31F50", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D01461E-2FCC-476C-8DA1-D353501A3502", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,115
CVE-2016-10815
2019-08-01T19:15:13.237
cPanel before 57.9999.54 allows arbitrary file-read operations for Webmail accounts via Branding APIs (SEC-120).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177C99D-46D6-4634-B716-84396FFBAAFA", "versionEndExcluding": "11.50.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C26391-C053-4410-A145-8BED0235D4B7", "versionEndExcluding": "11.52.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E5B5B5-42B0-4C5F-B354-C9845CE31F50", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3B2A12E-D9A1-4379-9AC0-8EAC95D56EA3", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.56.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,116
CVE-2016-10816
2019-08-01T19:15:13.407
cPanel before 57.9999.54 allows Webmail accounts to execute arbitrary code through forwarders (SEC-121).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177C99D-46D6-4634-B716-84396FFBAAFA", "versionEndExcluding": "11.50.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C26391-C053-4410-A145-8BED0235D4B7", "versionEndExcluding": "11.52.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E5B5B5-42B0-4C5F-B354-C9845CE31F50", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "034B4A2E-5445-44D2-94F9-E1176BF78B56", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,117
CVE-2016-10817
2019-08-01T19:15:13.517
cPanel before 57.9999.54 allows SQL Injection via the ModSecurity TailWatch log file (SEC-123).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177C99D-46D6-4634-B716-84396FFBAAFA", "versionEndExcluding": "11.50.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C26391-C053-4410-A145-8BED0235D4B7", "versionEndExcluding": "11.52.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E5B5B5-42B0-4C5F-B354-C9845CE31F50", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "034B4A2E-5445-44D2-94F9-E1176BF78B56", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,118
CVE-2016-10818
2019-08-01T19:15:13.643
cPanel before 57.9999.54 incorrectly sets log-file permissions in dnsadmin-startup and spamd-startup (SEC-124).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED27CCE-E4F8-414F-BB24-E83183AD4252", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,119
CVE-2016-10819
2019-08-01T19:15:13.767
In cPanel before 57.9999.54, user log files become world-readable when rotated by cpanellogd (SEC-125).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/58+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C177C99D-46D6-4634-B716-84396FFBAAFA", "versionEndExcluding": "11.50.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6C26391-C053-4410-A145-8BED0235D4B7", "versionEndExcluding": "11.52.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E5B5B5-42B0-4C5F-B354-C9845CE31F50", "versionEndExcluding": "11.54.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "034B4A2E-5445-44D2-94F9-E1176BF78B56", "versionEndExcluding": "56.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,120
CVE-2016-10820
2019-08-01T19:15:14.063
cPanel before 55.9999.141 allows daemons to access their controlling TTYs (SEC-31).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://forums.cpanel.net/threads/cpanel-tsr-2016-0002-full-disclosure.534481/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "79E8E0F9-EE9B-4F69-8D53-87179BC1B6A9", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "27155D28-DF4C-41C6-A1BC-1EA661B01554", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": "11.54.0.0.", "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,121
CVE-2016-10821
2019-08-01T19:15:14.377
In cPanel before 55.9999.141, Scripts/addpop reveals a command-line password in a process list (SEC-75).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "79E8E0F9-EE9B-4F69-8D53-87179BC1B6A9", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,122
CVE-2016-10826
2019-08-01T19:15:14.470
cPanel before 55.9999.141 allows attackers to bypass Two Factor Authentication via DNS clustering requests (SEC-93).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/56+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2016-0002-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A6710E-A1D7-4A7D-AD47-8D7B7A78BA61", "versionEndExcluding": "11.50.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.50.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "79E8E0F9-EE9B-4F69-8D53-87179BC1B6A9", "versionEndExcluding": "11.52.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.52.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4508F93-DA23-4AFC-AA20-92A6C271F6B1", "versionEndExcluding": "11.54.0.20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.54.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,123
CVE-2019-14260
2019-08-01T20:15:11.273
On the Alcatel-Lucent Enterprise (ALE) 8008 Cloud Edition Deskphone VoIP phone with firmware 1.50.13, a command injection (missing input validation) issue in the password change field for the Change Password interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Alcatel_8008CloudEditionDeskPhone.pdf?_=1559026340" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:al-enterprise:8008_firmware:1.50.13:*:*:*:cloud:*:*:*", "matchCriteriaId": "D94AE23B-B353-4D29-8015-A1C0700BF279", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:al-enterprise:8008:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99ACA30-4ADE-4D95-BF77-5F38FEB89BD4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
10,124
CVE-2019-14513
2019-08-01T21:15:12.247
Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Slovejoy/dnsmasq-pre2.76" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00013.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "matchCriteriaId": "C912DB7C-4A14-4E82-9619-E5F3E70D7F97", "versionEndExcluding": "2.76", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,125
CVE-2019-5401
2019-08-01T22:15:12.037
A potential security vulnerability has been identified in HP2910al-48G version W.15.14.0016. The attack exploits an xss injection by setting the attack vector in one of the switch persistent configuration fields (management URL, location, contact). But admin privileges are required to configure these fields thereby reducing the likelihood of exploit. HPE Aruba has provided firmware updates to resolve the vulnerability in HP 2910-48G al Switch. Please update to W.15.14.0017.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03944en_us" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:hp2910al-48g_firmware:w.15.14.00.16:*:*:*:*:*:*:*", "matchCriteriaId": "6D312561-2172-40DE-9D7C-26189F044745", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:hp2910al-48g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB9D0FD-DC04-4FCD-BC61-0B4356BB7070", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
10,126
CVE-2019-14517
2019-08-01T23:15:11.470
pandao Editor.md 1.5.0 allows XSS via the Javascript: string.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pandao/editor.md/issues/709" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:editor.md_project:editor.md:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "635DF5E5-1BD8-4750-A15C-38A27CB5387E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,127
CVE-2019-14523
2019-08-02T12:15:12.240
An issue was discovered in Schism Tracker through 20190722. There is an integer underflow via a large plen in fmt_okt_load_song in the Amiga Oktalyzer parser in fmt/okt.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html" }, { "source": "[email protected]", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schismtracker/schismtracker/issues/202" }, { "source": "[email protected]", "tags": [ "Release Notes" ], "url": "https://github.com/schismtracker/schismtracker/releases/tag/20190805" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schismtracker:schism_tracker:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DD466FF-0AC5-4680-B956-AD071BFB707A", "versionEndExcluding": null, "versionEndIncluding": "20190722", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,128
CVE-2019-14524
2019-08-02T12:15:12.317
An issue was discovered in Schism Tracker through 20190722. There is a heap-based buffer overflow via a large number of song patterns in fmt_mtm_load_song in fmt/mtm.c, a different vulnerability than CVE-2019-14465.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html" }, { "source": "[email protected]", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00083.html" }, { "source": "[email protected]", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schismtracker/schismtracker/issues/201" }, { "source": "[email protected]", "tags": [ "Release Notes" ], "url": "https://github.com/schismtracker/schismtracker/releases/tag/20190805" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schismtracker:schism_tracker:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DD466FF-0AC5-4680-B956-AD071BFB707A", "versionEndExcluding": null, "versionEndIncluding": "20190722", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*", "matchCriteriaId": "398716BC-E609-4338-BAB9-7CB2A78599BC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "matchCriteriaId": "C84D9410-31B7-421A-AD99-8ED2E45A9BC6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,129
CVE-2014-8184
2019-08-02T13:15:11.217
A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8184" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/liblouis/liblouis/issues/425" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:liblouis:liblouis:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF6A481B-2836-4D69-90B1-623DCEA40533", "versionEndExcluding": "2.5.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,130
CVE-2017-18382
2019-08-02T13:15:11.327
cPanel before 68.0.15 allows use of an unreserved e-mail address in DNS zone SOA records (SEC-306).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,131
CVE-2017-18383
2019-08-02T13:15:11.420
cPanel before 68.0.15 writes home-directory backups to an incorrect location (SEC-309).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,132
CVE-2017-18384
2019-08-02T13:15:11.467
cPanel before 68.0.15 allows jailed accounts to restore files that are outside of the jail (SEC-310).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,133
CVE-2017-18385
2019-08-02T13:15:11.547
cPanel before 68.0.15 allows unprivileged users to access restricted directories during account restores (SEC-311).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,134
CVE-2017-18386
2019-08-02T13:15:11.623
cPanel before 68.0.15 allows arbitrary code execution via Maketext injection in PostgresAdmin (SEC-313).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,135
CVE-2017-18387
2019-08-02T13:15:11.700
cPanel before 68.0.15 allows arbitrary code execution via Maketext injection in a Reseller style upload (SEC-314).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,136
CVE-2017-18388
2019-08-02T13:15:11.763
cPanel before 68.0.15 can perform unsafe file operations because Jailshell does not set the umask (SEC-315).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,137
CVE-2017-18389
2019-08-02T13:15:11.843
cPanel before 68.0.15 allows string format injection in dovecot-xaps-plugin (SEC-318).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,138
CVE-2017-18390
2019-08-02T13:15:11.903
cPanel before 68.0.15 allows code execution in the context of the root account because of weak permissions on incremental backups (SEC-322).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,139
CVE-2017-18391
2019-08-02T13:15:11.983
cPanel before 68.0.15 allows attackers to read backup files because they are world-readable during a short time interval (SEC-323).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://forums.cpanel.net/threads/cpanel-tsr-2017-0006-full-disclosure.615839/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,140
CVE-2019-10166
2019-08-02T13:15:12.107
It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/libvirt-privesc-vulnerabilities" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10166" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EBE53E7-FA47-4A57-B702-A09AAD367D41", "versionEndExcluding": "4.10.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "2004724A-67F7-45C3-8FEF-21F4DF5655B6", "versionEndExcluding": "5.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:virtualization:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "C32B0A34-5B95-4B1F-8077-5C7768FDFB33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,141
CVE-2019-10167
2019-08-02T13:15:12.170
The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2, "impactScore": 6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/libvirt-privesc-vulnerabilities" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10167" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EBE53E7-FA47-4A57-B702-A09AAD367D41", "versionEndExcluding": "4.10.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "2004724A-67F7-45C3-8FEF-21F4DF5655B6", "versionEndExcluding": "5.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:virtualization:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "C32B0A34-5B95-4B1F-8077-5C7768FDFB33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,142
CVE-2019-10168
2019-08-02T13:15:12.247
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2, "impactScore": 6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/libvirt-privesc-vulnerabilities" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Third Party Advisory", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10168" }, { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202003-18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EBE53E7-FA47-4A57-B702-A09AAD367D41", "versionEndExcluding": "4.10.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "matchCriteriaId": "2004724A-67F7-45C3-8FEF-21F4DF5655B6", "versionEndExcluding": "5.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:virtualization:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "C32B0A34-5B95-4B1F-8077-5C7768FDFB33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,143
CVE-2017-18392
2019-08-02T14:15:12.020
cPanel before 68.0.15 allows collisions because PostgreSQL databases can be assigned to multiple accounts (SEC-325).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 0.5, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,144
CVE-2017-18393
2019-08-02T14:15:12.363
cPanel before 68.0.15 does not block a username of postmaster, which might allow reception of private e-mail (SEC-326).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,145
CVE-2017-18394
2019-08-02T14:15:12.427
cPanel before 68.0.15 does not have a sufficient list of reserved usernames (SEC-327).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,146
CVE-2017-18395
2019-08-02T14:15:12.490
cPanel before 68.0.15 does not block a username of ssl (SEC-328).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,147
CVE-2017-18396
2019-08-02T14:15:12.567
cPanel before 68.0.15 allows arbitrary file-read operations via Exim vdomainaliases (SEC-329).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,148
CVE-2017-18397
2019-08-02T14:15:12.613
cPanel before 68.0.15 does not preserve permissions for local backup transport (SEC-330).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,149
CVE-2017-18398
2019-08-02T14:15:12.707
DnsUtils in cPanel before 68.0.15 allows zone creation for hostname and account subdomains (SEC-331).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,150
CVE-2017-18399
2019-08-02T14:15:12.757
cPanel before 68.0.15 allows attackers to read root's crontab file during a short time interval upon enabling or disabling sqloptimizer (SEC-332).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,151
CVE-2017-18400
2019-08-02T14:15:12.833
cPanel before 68.0.15 allows local root code execution via cpdavd (SEC-333).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,152
CVE-2017-18401
2019-08-02T14:15:12.910
cPanel before 68.0.15 allows user accounts to be partially created with invalid username formats (SEC-334).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,153
CVE-2017-18402
2019-08-02T14:15:12.990
cPanel before 68.0.15 allows stored XSS during a cpaddons moderated upgrade (SEC-336).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,154
CVE-2017-18403
2019-08-02T14:15:13.050
cPanel before 68.0.15 allows code execution in the context of the nobody account via Mailman archives (SEC-337).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,155
CVE-2017-18404
2019-08-02T14:15:13.130
cPanel before 68.0.15 allows domain data to be deleted for domains with the .lock TLD (SEC-341).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,156
CVE-2017-18405
2019-08-02T14:15:13.193
cPanel before 68.0.15 allows arbitrary file-read operations because of the backup .htaccess modification logic (SEC-345).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0006-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "803D8E28-06A7-4D3C-861F-EBCE8ED61B3A", "versionEndExcluding": "62.0.35", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C170CE5-10F2-4638-9ABA-55E5C44176D9", "versionEndExcluding": "64.0.42", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F465016-041B-48FD-B659-8698FF0E8181", "versionEndExcluding": "66.0.34", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EF55CA0-F55E-4DCA-8EB0-3DD897251D6B", "versionEndExcluding": "68.0.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,157
CVE-2017-18406
2019-08-02T14:15:13.257
cPanel before 67.9999.103 allows SQL injection during eximstats processing (SEC-276).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB7EBC48-3B0B-4641-9A6F-57229E8CE7D3", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,158
CVE-2017-18407
2019-08-02T14:15:13.317
cPanel before 67.9999.103 does not enforce SSL hostname verification for the support-agreement download (SEC-279).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB7EBC48-3B0B-4641-9A6F-57229E8CE7D3", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,159
CVE-2017-18408
2019-08-02T14:15:13.363
cPanel before 67.9999.103 allows stored XSS in WHM MySQL Password Change interfaces (SEC-282).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB7EBC48-3B0B-4641-9A6F-57229E8CE7D3", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,160
CVE-2017-18409
2019-08-02T14:15:13.443
In cPanel before 67.9999.103, the backup interface could return a backup archive with all MySQL databases (SEC-283).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB7EBC48-3B0B-4641-9A6F-57229E8CE7D3", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,161
CVE-2017-18410
2019-08-02T14:15:13.490
In cPanel before 67.9999.103, a user account's backup archive could contain all MySQL databases on the server (SEC-284).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB7EBC48-3B0B-4641-9A6F-57229E8CE7D3", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,162
CVE-2017-18411
2019-08-02T14:15:13.567
The "addon domain conversion" feature in cPanel before 67.9999.103 can copy all MySQL databases to the new account (SEC-285).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "179399A2-B445-44BF-BB64-F212CB267EB0", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,163
CVE-2017-18412
2019-08-02T14:15:13.630
cPanel before 67.9999.103 allows Apache HTTP Server log files to become world-readable because of mishandling on an account rename (SEC-296).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "179399A2-B445-44BF-BB64-F212CB267EB0", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,164
CVE-2017-18413
2019-08-02T14:15:13.693
In cPanel before 67.9999.103, the backup system overwrites root's home directory when a mount disappears (SEC-299).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B24A9B-F2D3-4282-9270-0A6E3166B726", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C72F220-BEF2-41F6-8312-A5DE70D2E218", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "179399A2-B445-44BF-BB64-F212CB267EB0", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FDB6E8-4C9D-47B4-90AD-6022D9DD5976", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "07B4EC93-FA39-4633-92FD-B7CA330D3F2D", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "67.9999.64", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,165
CVE-2017-18414
2019-08-02T14:15:13.740
cPanel before 67.9999.103 allows an open redirect in /unprotected/redirect.html (SEC-300).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5BD6FC3-11D4-47B4-8BD3-CF2CBE7B1138", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "736F9A38-5BD2-441A-A9D3-25BF752C8928", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F311F5-58EF-4985-A79D-8614EB1A0709", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A63076C-335A-47AD-AEF5-6556B630770D", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B349761-D09A-477E-93D9-E053A2AC8732", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,166
CVE-2017-18415
2019-08-02T14:15:13.800
cPanel before 67.9999.103 allows code execution in the context of the mailman account because of incorrect environment-variable filtering (SEC-302).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5BD6FC3-11D4-47B4-8BD3-CF2CBE7B1138", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "736F9A38-5BD2-441A-A9D3-25BF752C8928", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F311F5-58EF-4985-A79D-8614EB1A0709", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A63076C-335A-47AD-AEF5-6556B630770D", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B349761-D09A-477E-93D9-E053A2AC8732", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,167
CVE-2017-18416
2019-08-02T14:15:13.897
cPanel before 67.9999.103 allows arbitrary file-overwrite operations during a Roundcube SQLite schema update (SEC-303).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/68+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0005-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5BD6FC3-11D4-47B4-8BD3-CF2CBE7B1138", "versionEndExcluding": "56.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "736F9A38-5BD2-441A-A9D3-25BF752C8928", "versionEndExcluding": "60.0.48", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F6E962-A1DA-4B7F-9A32-1182DAA065D5", "versionEndExcluding": "62.0.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F311F5-58EF-4985-A79D-8614EB1A0709", "versionEndExcluding": "64.0.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A63076C-335A-47AD-AEF5-6556B630770D", "versionEndExcluding": "66.0.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B349761-D09A-477E-93D9-E053A2AC8732", "versionEndExcluding": "67.9999.103", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,168
CVE-2018-1987
2019-08-02T14:15:13.990
IBM Spectrum Protect for Enterprise Resource Planning 7.1 and 8.1, if tracing is activated, the IBM Spectrum Protect node password may be displayed in plain text in the ERP trace file. IBM X-Force ID: 154280.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.4, "impactScore": 3.6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10883782" }, { "source": "[email protected]", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/154280" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_db2:*:*", "matchCriteriaId": "EFB4FCF9-7F81-4CED-B08C-4DF7D8D5D4CF", "versionEndExcluding": null, "versionEndIncluding": "7.1.3.1", "versionStartExcluding": null, "versionStartIncluding": "7.1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_oracle:*:*", "matchCriteriaId": "45CA22F1-0F19-47A0-A8A0-413AC0F055A8", "versionEndExcluding": null, "versionEndIncluding": "7.1.3.1", "versionStartExcluding": null, "versionStartIncluding": "7.1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_hana:*:*", "matchCriteriaId": "AA57DAF6-87D4-4D88-B449-978340B4A5FD", "versionEndExcluding": null, "versionEndIncluding": "7.1.3.1", "versionStartExcluding": null, "versionStartIncluding": "7.1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_db2:*:*", "matchCriteriaId": "645EF2BE-2F15-4655-B2EA-4A8102137A41", "versionEndExcluding": null, "versionEndIncluding": "8.1.4.0", "versionStartExcluding": null, "versionStartIncluding": "8.1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_for_oracle:*:*", "matchCriteriaId": "D9195032-5514-47FC-9E4A-E691C1EEC1E6", "versionEndExcluding": null, "versionEndIncluding": "8.1.4.0", "versionStartExcluding": null, "versionStartIncluding": "8.1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:data_protection:*:*:*:*:*:sap_hana:*:*", "matchCriteriaId": "F5DC7082-39B0-4CA7-ABCA-AE40E834782F", "versionEndExcluding": null, "versionEndIncluding": "8.1.6.0", "versionStartExcluding": null, "versionStartIncluding": "8.1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,169
CVE-2019-10171
2019-08-02T14:15:14.067
It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was incorrectly applied in RHEL 7.5. An attacker would still be able to provoke excessive CPU consumption leading to a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A9EE6A0-E152-4032-B4B3-21C848652685", "versionEndExcluding": "1.4.0.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,170
CVE-2019-10938
2019-08-02T14:15:14.147
A vulnerability has been identified in SIPROTEC 5 devices with CPU variants CP200 (All versions < V7.59), SIPROTEC 5 devices with CPU variants CP300 and CP100 (All versions < V8.01), Siemens Power Meters Series 9410 (All versions < V2.2.1), Siemens Power Meters Series 9810 (All versions). An unauthenticated attacker with network access to the device could potentially insert arbitrary code which is executed before firmware verification in the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" }, { "source": "[email protected]", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*", "matchCriteriaId": "23076116-128D-4366-B5BC-B965001FE356", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*", "matchCriteriaId": "3457758B-A04D-4544-B0FA-DF87AA11D8FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F0672FC-AEC1-445B-B958-AEDB6DCEE1E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF247CA0-37E1-40DF-96F5-9F00128EA250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDD3C99B-CDD8-4919-BE72-73814C2642A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBE6CCA9-A246-4EB2-A57B-FE6823A9E3FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11B4A68-F533-4AC0-80A9-7374FDFE2DEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F8D692-F268-45A4-9348-C67890A58881", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5A3FFD-17AD-4820-97D3-2F093BD5F322", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*", "matchCriteriaId": "5739872A-E271-48BB-ABB5-17608E81AE7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC6417D-2C81-4654-B7FF-6C3E1B709962", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*", "matchCriteriaId": "C52A6630-46F3-4113-B5E8-F5BAB7801CB0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*", "matchCriteriaId": "088AC7F2-4FF3-4EF9-A111-D47DB859ECA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DD95AC-9B8F-43CD-9483-2BB9C4E86376", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A9F05D9-C1DF-4D73-8634-239ABFE526DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C6662F7-5E3D-43A8-9984-EF1540BC917B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*", "matchCriteriaId": "E122323B-A42B-4DAB-A071-ACF76DC45E28", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAA9E810-2C00-4721-B3A6-E7CD7184BA24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E959A8E-21D1-4950-974B-A89693C14DC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA075D19-21BF-4A7C-87B8-6A9D99799826", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AC0D445-9A9B-4799-8B83-8B15821A6CC1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A73860-76C5-435B-8150-1EABF644ADA0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D58566D-C2F7-4D9A-ACD6-D493E4531491", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D9FD3B7-C7F7-41C1-9290-411F9D912D00", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:siprotec_5_digsi_device_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "302821EE-C152-47A9-95F6-9D6B82803E3C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
10,171
CVE-2019-14528
2019-08-02T14:15:14.223
GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/scanner.l via crafted COBOL source code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://sourceforge.net/p/open-cobol/bugs/583/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnucobol_project:gnucobol:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "B77EB056-4A0B-4FD6-9B09-F83FF20C691B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,172
CVE-2019-14529
2019-08-02T14:15:14.287
OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Wezery/CVE-2019-14529" }, { "source": "[email protected]", "tags": [ "Product" ], "url": "https://github.com/openemr/openemr/pull/2592" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA59957D-721D-444F-A278-CBC0E1F02CFD", "versionEndExcluding": "5.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,173
CVE-2019-4275
2019-08-02T14:15:14.363
IBM Jazz for Service Management 1.1.3, 1.1.3.1, and 1.1.3.2 could allow an unauthorized local user to create unique catalog names that could cause a denial of service. IBM X-Force ID: 160296.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=ibm10959011" }, { "source": "[email protected]", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160296" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:jazz_for_service_management:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A4D61491-0785-4193-A828-2177AFB81380", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:jazz_for_service_management:1.1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F135103B-FF7A-43C1-8CD5-31666B87081A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:jazz_for_service_management:1.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDCF7498-9E5C-44DA-82EF-15D78917629A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,174
CVE-2019-10176
2019-08-02T15:15:11.803
A flaw was found in OpenShift Container Platform, versions 3.11 and later, in which the CSRF tokens used in the cluster console component were found to remain static during a user's session. An attacker with the ability to observe the value of this token would be able to re-use the token to perform a CSRF attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.5, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:2792" }, { "source": "[email protected]", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:4053" }, { "source": "[email protected]", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10176" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,175
CVE-2019-14232
2019-08-02T15:15:11.880
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "[email protected]", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "[email protected]", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/10/04/6" }, { "source": "[email protected]", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/03/04/1" }, { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "[email protected]", "tags": null, "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "[email protected]", "tags": null, "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "[email protected]", "tags": null, "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "[email protected]", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "[email protected]", "tags": null, "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,176
CVE-2019-14233
2019-08-02T15:15:11.943
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "[email protected]", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "[email protected]", "tags": null, "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "[email protected]", "tags": null, "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "[email protected]", "tags": null, "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "[email protected]", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "[email protected]", "tags": null, "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,177
CVE-2019-14235
2019-08-02T15:15:12.023
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" }, { "source": "[email protected]", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" }, { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.djangoproject.com/en/dev/releases/security/" }, { "source": "[email protected]", "tags": null, "url": "https://groups.google.com/forum/#%21topic/django-announce/jIoju2-KLDs" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/" }, { "source": "[email protected]", "tags": null, "url": "https://seclists.org/bugtraq/2019/Aug/15" }, { "source": "[email protected]", "tags": null, "url": "https://security.gentoo.org/glsa/202004-17" }, { "source": "[email protected]", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190828-0002/" }, { "source": "[email protected]", "tags": null, "url": "https://www.debian.org/security/2019/dsa-4498" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://www.djangoproject.com/weblog/2019/aug/01/security-releases/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "F49BD116-09A6-454E-BB68-65FCDE06DF33", "versionEndExcluding": "1.11.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D05096B-F60E-4DB2-AE59-EED55F945AB0", "versionEndExcluding": "2.1.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B4FBBCF-BF41-487F-A6DA-A3A12E42D28B", "versionEndExcluding": "2.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,178
CVE-2019-14531
2019-08-02T15:15:12.087
An issue was discovered in The Sleuth Kit (TSK) 4.6.6. There is an out of bounds read on iso9660 while parsing System Use Sharing Protocol data in fs/iso9660.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sleuthkit/sleuthkit/issues/1576" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sleuthkit:the_sleuth_kit:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CF4E853-C847-48D6-ADB3-8A37F866C847", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,179
CVE-2019-14532
2019-08-02T15:15:12.147
An issue was discovered in The Sleuth Kit (TSK) 4.6.6. There is an off-by-one overwrite due to an underflow on tools/hashtools/hfind.cpp while using a bogus hash table.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sleuthkit/sleuthkit/issues/1575" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB/" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA/" }, { "source": "[email protected]", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFQKIE5U3LS5U7POPGS7YHLUSW2URWGJ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sleuthkit:the_sleuth_kit:4.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CF4E853-C847-48D6-ADB3-8A37F866C847", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,180
CVE-2019-5493
2019-08-02T15:15:12.273
Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 are susceptible to a vulnerability which discloses information to an unauthenticated attacker. A successful attack requires that multiple non-default options be enabled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190801-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "661AA703-BAFA-4711-B224-CABEFE323BC9", "versionEndExcluding": "8.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p1:*:*:*:*:*:*", "matchCriteriaId": "9A5B2ACC-885C-487F-95F6-B67983E9E255", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p2:*:*:*:*:*:*", "matchCriteriaId": "CC3377B6-1732-4A2B-98BC-21AA79812363", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,181
CVE-2019-5501
2019-08-02T15:15:12.333
Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 may disclose sensitive LDAP account information to unauthenticated remote attackers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190801-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "661AA703-BAFA-4711-B224-CABEFE323BC9", "versionEndExcluding": "8.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p1:*:*:*:*:*:*", "matchCriteriaId": "9A5B2ACC-885C-487F-95F6-B67983E9E255", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:8.2.5:p2:*:*:*:*:*:*", "matchCriteriaId": "CC3377B6-1732-4A2B-98BC-21AA79812363", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,182
CVE-2017-18417
2019-08-02T16:15:11.787
cPanel before 66.0.2 allows stored XSS during WHM cPAddons installation (SEC-263).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7408F14F-6D46-411A-B62A-08F632537813", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,183
CVE-2017-18418
2019-08-02T16:15:11.850
cPanel before 66.0.2 allows stored XSS during WHM cPAddons file operations (SEC-265).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7408F14F-6D46-411A-B62A-08F632537813", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,184
CVE-2017-18419
2019-08-02T16:15:11.897
cPanel before 66.0.2 allows stored XSS during WHM cPAddons uninstallation (SEC-266).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7408F14F-6D46-411A-B62A-08F632537813", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,185
CVE-2017-18420
2019-08-02T16:15:11.977
cPanel before 66.0.2 allows stored XSS during WHM cPAddons processing (SEC-269).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7408F14F-6D46-411A-B62A-08F632537813", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,186
CVE-2017-18421
2019-08-02T16:15:12.037
cPanel before 66.0.2 allows demo accounts to create databases and users (SEC-271).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB00CEC-8A7C-4A6D-B7F0-44888D0F654A", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1A61832-3412-4384-B09C-4E559FCC2AC0", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AE17BA2-BDD4-42E3-AA74-04B481FAFAB7", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF1F5D15-72DA-4E1A-8531-E78BA42520EB", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,187
CVE-2017-18422
2019-08-02T16:15:12.117
In cPanel before 66.0.2, EasyApache 4 conversion sets weak domlog ownership and permissions (SEC-272).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C5C0F44-05FE-4C26-9CD9-13A5630C8DAB", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FCAEC05-C807-4607-A362-6438A069D5C6", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "58.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB00CEC-8A7C-4A6D-B7F0-44888D0F654A", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1A61832-3412-4384-B09C-4E559FCC2AC0", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AE17BA2-BDD4-42E3-AA74-04B481FAFAB7", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF1F5D15-72DA-4E1A-8531-E78BA42520EB", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,188
CVE-2017-18423
2019-08-02T16:15:12.163
In cPanel before 66.0.2, domain log files become readable after log processing (SEC-273).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C5C0F44-05FE-4C26-9CD9-13A5630C8DAB", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FCAEC05-C807-4607-A362-6438A069D5C6", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "58.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB00CEC-8A7C-4A6D-B7F0-44888D0F654A", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1A61832-3412-4384-B09C-4E559FCC2AC0", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AE17BA2-BDD4-42E3-AA74-04B481FAFAB7", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF1F5D15-72DA-4E1A-8531-E78BA42520EB", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,189
CVE-2017-18424
2019-08-02T16:15:12.240
In cPanel before 66.0.2, the Apache HTTP Server configuration file is changed to world-readable when rebuilt (SEC-274).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB00CEC-8A7C-4A6D-B7F0-44888D0F654A", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1A61832-3412-4384-B09C-4E559FCC2AC0", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AE17BA2-BDD4-42E3-AA74-04B481FAFAB7", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF1F5D15-72DA-4E1A-8531-E78BA42520EB", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,190
CVE-2017-18425
2019-08-02T16:15:12.303
In cPanel before 66.0.2, the cpdavd_error_log file can be created with weak permissions (SEC-280).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0004-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C5C0F44-05FE-4C26-9CD9-13A5630C8DAB", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FCAEC05-C807-4607-A362-6438A069D5C6", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "58.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB00CEC-8A7C-4A6D-B7F0-44888D0F654A", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1A61832-3412-4384-B09C-4E559FCC2AC0", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AE17BA2-BDD4-42E3-AA74-04B481FAFAB7", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF1F5D15-72DA-4E1A-8531-E78BA42520EB", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "66.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,191
CVE-2017-18426
2019-08-02T16:15:12.380
cPanel before 66.0.2 allows resellers to read other accounts' domain log files (SEC-288).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7408F14F-6D46-411A-B62A-08F632537813", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,192
CVE-2017-18427
2019-08-02T16:15:12.443
In cPanel before 66.0.2, weak log-file permissions can occur after account modification (SEC-289).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB86F18E-DCE6-4780-9A4D-A95E1C44AD2B", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1655B2-A0F5-48FD-9A8C-03129C02A2DE", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDBFF216-2F0A-48F8-9A4D-63179DFACD53", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F646E95-64DD-4F95-9CF2-DD02A8E15931", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "64EC469B-7352-479A-B1A2-A8564B979477", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F31B57-361E-4D48-AF91-85DFA98D0011", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,193
CVE-2017-18428
2019-08-02T16:15:12.537
In cPanel before 66.0.2, Apache HTTP Server domlogs become temporarily world-readable during log processing (SEC-290).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB86F18E-DCE6-4780-9A4D-A95E1C44AD2B", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1655B2-A0F5-48FD-9A8C-03129C02A2DE", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDBFF216-2F0A-48F8-9A4D-63179DFACD53", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F646E95-64DD-4F95-9CF2-DD02A8E15931", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "64EC469B-7352-479A-B1A2-A8564B979477", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F31B57-361E-4D48-AF91-85DFA98D0011", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,194
CVE-2017-18429
2019-08-02T16:15:12.617
In cPanel before 66.0.2, Apache HTTP Server SSL domain logs can persist on disk after an account termination (SEC-291).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB86F18E-DCE6-4780-9A4D-A95E1C44AD2B", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1655B2-A0F5-48FD-9A8C-03129C02A2DE", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDBFF216-2F0A-48F8-9A4D-63179DFACD53", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F646E95-64DD-4F95-9CF2-DD02A8E15931", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "64EC469B-7352-479A-B1A2-A8564B979477", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F31B57-361E-4D48-AF91-85DFA98D0011", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,195
CVE-2017-18430
2019-08-02T16:15:12.693
In cPanel before 66.0.2, user and group ownership may be incorrectly set when using reassign_post_terminate_cruft (SEC-294).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0004-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB86F18E-DCE6-4780-9A4D-A95E1C44AD2B", "versionEndExcluding": "56.0.51", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1655B2-A0F5-48FD-9A8C-03129C02A2DE", "versionEndExcluding": "58.0.52", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDBFF216-2F0A-48F8-9A4D-63179DFACD53", "versionEndExcluding": "60.0.45", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F646E95-64DD-4F95-9CF2-DD02A8E15931", "versionEndExcluding": "62.0.27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "64EC469B-7352-479A-B1A2-A8564B979477", "versionEndExcluding": "64.0.33", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F31B57-361E-4D48-AF91-85DFA98D0011", "versionEndExcluding": "66.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,196
CVE-2017-18431
2019-08-02T16:15:12.773
cPanel before 66.0.1 does not reliably perform suspend/unsuspend operations on accounts (CPANEL-13941).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/66+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACD0003-3D8E-4B4C-9771-5D00B64900D4", "versionEndExcluding": "66.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "65.9999.38", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,197
CVE-2017-18432
2019-08-02T16:15:12.850
In cPanel before 64.0.21, Horde MySQL to SQLite conversion can leak a database password (SEC-234).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,198
CVE-2017-18433
2019-08-02T16:15:12.913
cPanel before 64.0.21 allows code execution by webmail and demo accounts via a store_filter API call (SEC-236).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,199
CVE-2017-18434
2019-08-02T16:15:12.977
cPanel before 64.0.21 allows code execution in the context of the root account via a SET_VHOST_LANG_PACKAGE multilang adminbin call (SEC-237).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,200
CVE-2017-18435
2019-08-02T16:15:13.053
cPanel before 64.0.21 allows demo accounts to execute code via the BoxTrapper API (SEC-238).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,201
CVE-2019-9141
2019-08-02T16:15:13.163
ZInsVX.dll ActiveX Control 2018.02 and earlier in Zoneplayer contains a vulnerability that could allow remote attackers to execute arbitrary files by setting the arguments to the ActiveX method. This can be leveraged for remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "[email protected]", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "[email protected]", "type": "Primary" } ] }
[ { "source": "[email protected]", "tags": [ "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35104" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imgtech:zoneplayer:*:*:*:*:*:*:*:*", "matchCriteriaId": "48A0E336-F8AB-4A92-AA31-CECCDF30DBF9", "versionEndExcluding": null, "versionEndIncluding": "2018.02", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,202
CVE-2017-18436
2019-08-02T17:15:12.027
cPanel before 64.0.21 allows demo accounts to read files via a Fileman::getfileactions API2 call (SEC-239).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,203
CVE-2017-18437
2019-08-02T17:15:12.230
cPanel before 64.0.21 allows a Webmail account to execute code via forwarders (SEC-240).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,204
CVE-2017-18438
2019-08-02T17:15:12.403
cPanel before 64.0.21 allows demo accounts to execute code via Encoding API calls (SEC-242).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,205
CVE-2017-18439
2019-08-02T17:15:12.467
cPanel before 64.0.21 allows demo accounts to execute code via an ImageManager_dimensions API call (SEC-243).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,206
CVE-2017-18440
2019-08-02T17:15:12.527
cPanel before 64.0.21 allows demo users to execute traceroute via api2 (SEC-244).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE91306B-6904-409F-B07B-138F02A33F40", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "56.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC7D380-7D81-410E-BCBA-849B43DF3D9B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "58.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C30C71E1-3637-4822-BB84-7DD3888F30DB", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "60.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C618804-1CA5-4B06-9707-9B61F8A7F642", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "62.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E7DCF36-29DD-4EBC-8F12-2951DF18FDA8", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "64.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,207
CVE-2017-18441
2019-08-02T17:15:12.590
cPanel before 64.0.21 allows demo accounts to redirect web traffic (SEC-245).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,208
CVE-2017-18442
2019-08-02T17:15:12.653
cPanel before 64.0.21 allows demo accounts to execute Cpanel::SPFUI API commands (SEC-246).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,209
CVE-2017-18443
2019-08-02T17:15:12.717
cPanel before 64.0.21 allows demo and suspended accounts to use SSH port forwarding (SEC-247).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,210
CVE-2017-18444
2019-08-02T17:15:12.777
cPanel before 64.0.21 allows demo accounts to execute SSH API commands (SEC-248).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,211
CVE-2017-18445
2019-08-02T17:15:12.840
cPanel before 64.0.21 does not enforce demo restrictions for SSL API calls (SEC-249).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "[email protected]", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "[email protected]", "type": "Primary" } ], "cvssMetricV31": null }
[ { "source": "[email protected]", "tags": [ "Product", "Release Notes" ], "url": "https://documentation.cpanel.net/display/CL/64+Change+Log" }, { "source": "[email protected]", "tags": [ "Vendor Advisory" ], "url": "https://news.cpanel.com/cpanel-tsr-2017-0003-full-disclosure/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF9C5E6B-ADA9-4C43-BF11-004BA45AB616", "versionEndExcluding": "56.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "55.9999.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9435A6B6-54C3-4072-ABD3-EFA966EC3E3B", "versionEndExcluding": "58.0.49", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "57.9999.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "923B5DF2-0F38-4780-A5FE-5DE690D8DC11", "versionEndExcluding": "60.0.43", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "59.9999.58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CC56C7-8AAD-4222-A368-D16369546408", "versionEndExcluding": "62.0.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "61.9999.55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6AACBD-F1B1-473A-976D-3775D78BB335", "versionEndExcluding": "64.0.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "63.9999.74", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
10,212