CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
cPanel before 88.0.13 allows self XSS via DNS Zone Manager DNSSEC interfaces (SEC-564). |
cPanel before 88.0.13 allows bypass of a protection mechanism that attempted to restrict package modification (SEC-557). |
cPanel before 88.0.13 mishandles file-extension dispatching, leading to code execution (SEC-488). |
cPanel before 88.0.3, upon an upgrade, establishes predictable PowerDNS API keys (SEC-561). |
cPanel before 88.0.3 has weak permissions (world readable) for the proxy subdomains log file (SEC-558). |
In cPanel before 88.0.3, insecure chkservd test credentials are used on a templated VM (SEC-554). |
In cPanel before 88.0.3, an insecure SRS secret is used on a templated VM (SEC-552). |
In cPanel before 88.0.3, an insecure site password is used for Mailman on a templated VM (SEC-551). |
In cPanel before 88.0.3, an insecure auth policy API key is used by Dovecot on a templated VM (SEC-550). |
In cPanel before 88.0.3, insecure RNDC credentials are used for BIND on a templated VM (SEC-549). |
chsh in cPanel before 88.0.3 allows a Jailshell escape (SEC-497). |
cPanel before 88.0.3 allows attackers to bypass the SMTP greylisting protection mechanism (SEC-491). |
cPanel before 88.0.3 mishandles the Exim filter path, leading to remote code execution (SEC-485). |
cPanel before 86.0.14 allows attackers to obtain access to the current working directory via the account backup feature (SEC-540). |
cPanel before 86.0.14 allows remote attackers to trigger a bandwidth suspension via mail log strings (SEC-505). |
cPanel before 84.0.20 allows a webmail or demo account to delete arbitrary files (SEC-547). |
cPanel before 84.0.20 allows a demo account to achieve code execution via PassengerApps APIs (SEC-546). |
cPanel before 84.0.20 allows resellers to achieve remote code execution as root via a cpsrvd rsync shell (SEC-545). |
cPanel before 84.0.20 allows a demo account to achieve remote code execution via a cpsrvd rsync shell (SEC-544). |
cPanel before 84.0.20 allows a demo account to modify files via Branding API calls (SEC-543). |