| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| cPanel before 11.54.0.0 allows unauthorized zone modification via the WHM API (SEC-66). |
| cPanel before 11.54.0.0 allows unauthorized password changes via Webmail API commands (SEC-65). |
| cPanel before 11.54.0.0 allows a bypass of the e-mail sending limit (SEC-60). |
| cPanel before 11.54.0.0 allows subaccounts to discover sensitive data through comet feeds (SEC-29). |
| cPanel before 11.54.0.4 lacks ACL enforcement in the AppConfig subsystem (SEC-85). |
| cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/quotacheck (SEC-81). |
| cPanel before 11.54.0.4 allows arbitrary file-read operations via the bin/fmq script (SEC-70). |
| cPanel before 55.9999.141 allows arbitrary file-read operations during authentication with caldav (SEC-108). |
| cPanel before 55.9999.141 allows a POP/IMAP cPHulk bypass via account name munging (SEC-107). |
| cPanel before 55.9999.141 mishandles username-based blocking for PRE requests in cPHulkd (SEC-104). |
| cPanel before 55.9999.141 allows FTP cPHulk bypass via account name munging (SEC-102). |
| cPanel before 55.9999.141 does not perform as two-factor authentication check when possessing another account (SEC-101). |
| cPanel before 55.9999.141 allows ACL bypass for AppConfig applications via magic_revision (SEC-100). |
| cPanel before 55.9999.141 allows attackers to bypass Two Factor Authentication via DNS clustering requests (SEC-93). |
| cPanel before 55.9999.141 allows daemons to access their controlling TTYs (SEC-31). |
| cPanel before 58.0.4 allows code execution in the context of other user accounts through the PHP CGI handler (SEC-142). |
| cPanel before 58.0.4 does not set the Pear tmp directory during a PHP installation (SEC-137). |
| cPanel before 59.9999.145 allows code execution in the context of other accounts via mailman list archives (SEC-141). |
| ProjectSend (formerly cFTP) r582 allows Insecure Direct Object Reference via includes/actions.log.export.php. |
| ProjectSend (formerly cFTP) r582 allows authentication bypass via a direct request for users.php, home.php, edit-file.php?file_id=1, or process-zip-download.php, or add_user_form_* parameters to users-add.php. |