| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| In cPanel before 57.9999.54, /scripts/enablefileprotect exposed TTYs (SEC-117). |
| In cPanel before 57.9999.54, /scripts/unsuspendacct exposed TTYs (SEC-116). |
| In cPanel before 57.9999.54, /scripts/maildir_converter exposed a TTY to an unprivileged process (SEC-115). |
| In cPanel before 57.9999.54, /scripts/checkinfopages exposed a TTY to an unprivileged process (SEC-114). |
| In cPanel before 57.9999.54, /scripts/addpop and /scripts/delpop exposed TTYs (SEC-113). |
| cPanel before 57.9999.54 allows certain denial-of-service outcomes via /scripts/killpvhost (SEC-112). |
| cPanel before 57.9999.54 allows self XSS on the Paper Lantern Landing Page (SEC-110). |
| cPanel before 57.9999.54 allows demo accounts to execute arbitrary code via ajax_maketext_syntax_util.pl (SEC-109). |
| The SQLite journal feature in cPanel before 57.9999.54 allows arbitrary file-overwrite operations during Horde Restore (SEC-58). |
| cPanel before 57.9999.105 allows newline injection via LOC records (CPANEL-6923). |
| cPanel before 58.0.4 allows code execution in the context of other user accounts through the PHP CGI handler (SEC-142). |
| cPanel before 58.0.4 has improper session handling for shared users (SEC-139). |
| cPanel before 58.0.4 allows demo-mode escape via Site Templates and Boxtrapper API calls (SEC-138). |
| cPanel before 58.0.4 does not set the Pear tmp directory during a PHP installation (SEC-137). |
| cPanel before 58.0.4 allows a file-ownership change (to nobody) via rearrangeacct (SEC-134). |
| cPanel before 58.0.4 allows WHM "Purchase and Install an SSL Certificate" page visitors to list all server domains (SEC-133). |
| cPanel before 58.0.4 initially uses weak permissions for Apache HTTP Server log files (SEC-130). |
| cPanel before 59.9999.145 allows stored XSS in the WHM tail_upcp2.cgi interface (SEC-156). |
| cPanel before 59.9999.145 allows arbitrary file-read operations because of a multipart form processing error (SEC-154). |
| cPanel before 59.9999.145 allows arbitrary code execution due to an incorrect #! in Mail::SPF scripts (SEC-152). |