Filtered by vendor Control-webpanel
Subscriptions
Filtered by product Webpanel
Subscriptions
Total
80 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-14722 | 1 Control-webpanel | 1 Webpanel | 2024-08-05 | 4.3 Medium |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to delete an e-mail forwarding destination from a victim's account via an attacker account. | ||||
CVE-2019-13605 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.838 to 0.9.8.846, remote attackers can bypass authentication in the login process by leveraging the knowledge of a valid username. The attacker must defeat an encoding that is not equivalent to base64, and thus this is different from CVE-2019-13360. | ||||
CVE-2019-13599 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 5.3 Medium |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.848, the Login process allows attackers to check whether a username is valid by comparing response times. | ||||
CVE-2019-13476 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.837, XSS in the domain parameter allows a low-privilege user to achieve root access via the email list page. | ||||
CVE-2019-13477 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.837, CSRF in the forgot password function allows an attacker to change the password for the root account. | ||||
CVE-2019-13360 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, remote attackers can bypass authentication in the login process by leveraging knowledge of a valid username. | ||||
CVE-2019-13383 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 5.3 Medium |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, the Login process allows attackers to check whether a username is valid by reading the HTTP response. | ||||
CVE-2019-13359 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.836, a cwpsrv-xxx cookie allows a normal user to craft and upload a session file to the /tmp directory, and use it to become the root user. | ||||
CVE-2019-13387 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 6.1 Medium |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, Reflected XSS in filemanager2.php (parameter fm_current_dir) allows attackers to steal a cookie or session, or redirect to a phishing website. | ||||
CVE-2019-13385 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 4.3 Medium |
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.840, File and Directory Information Exposure in filemanager allows attackers to enumerate users and check for active users of the application by reading /tmp/login.log. | ||||
CVE-2019-12190 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
XSS was discovered in CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.747 via the testacc/fileManager2.php fm_current_dir or filename parameter. | ||||
CVE-2019-11429 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version), 0.9.8.753 (Pro) and 0.9.8.807 (Pro) is vulnerable to Reflected XSS for the "Domain" field on the "DNS Functions > "Add DNS Zone" screen. | ||||
CVE-2019-7646 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | N/A |
CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.763 is vulnerable to Stored/Persistent XSS for the "Package Name" field via the add_package module parameter. | ||||
CVE-2020-15611 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 9.8 Critical |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_restart parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9734. | ||||
CVE-2020-15626 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 7.5 High |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the term parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9730. | ||||
CVE-2020-15608 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 9.8 Critical |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the ai_service parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9724. | ||||
CVE-2020-15610 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 9.8 Critical |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the modulo parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9728. | ||||
CVE-2020-15617 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 7.5 High |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the status parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9708. | ||||
CVE-2020-15623 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 9.8 Critical |
This vulnerability allows remote attackers to write arbitrary files on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the archivo parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9722. | ||||
CVE-2020-15616 | 1 Control-webpanel | 1 Webpanel | 2024-08-04 | 7.5 High |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the package parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9706. |