All the vulnerabilites related to ZPanel - ZPanel
cve-2007-1123
Vulnerability from cvelistv5
Published
2007-02-27 02:00
Modified
2024-08-07 12:43
Severity ?
EPSS score ?
Summary
Multiple PHP remote file inclusion vulnerabilities in ZPanel 2.0 allow remote attackers to execute arbitrary PHP code via a URL in (1) the body parameter to templates/ZPanelV2/template.php or (2) the page parameter to zpanel.php. NOTE: the zpanel.php vector may overlap CVE-2005-0793.2. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/33498 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32659 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/0710 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/22683 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/24275 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32680 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33498", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33498" }, { "name": "zpanel-template-file-include(32659)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32659" }, { "name": "ADV-2007-0710", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0710" }, { "name": "22683", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22683" }, { "name": "24275", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24275" }, { "name": "zpanel-zpanel-file-include(32680)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in ZPanel 2.0 allow remote attackers to execute arbitrary PHP code via a URL in (1) the body parameter to templates/ZPanelV2/template.php or (2) the page parameter to zpanel.php. NOTE: the zpanel.php vector may overlap CVE-2005-0793.2. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33498", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33498" }, { "name": "zpanel-template-file-include(32659)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32659" }, { "name": "ADV-2007-0710", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0710" }, { "name": "22683", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22683" }, { "name": "24275", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24275" }, { "name": "zpanel-zpanel-file-include(32680)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple PHP remote file inclusion vulnerabilities in ZPanel 2.0 allow remote attackers to execute arbitrary PHP code via a URL in (1) the body parameter to templates/ZPanelV2/template.php or (2) the page parameter to zpanel.php. NOTE: the zpanel.php vector may overlap CVE-2005-0793.2. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "33498", "refsource": "OSVDB", "url": "http://osvdb.org/33498" }, { "name": "zpanel-template-file-include(32659)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32659" }, { "name": "ADV-2007-0710", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0710" }, { "name": "22683", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22683" }, { "name": "24275", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24275" }, { "name": "zpanel-zpanel-file-include(32680)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32680" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1123", "datePublished": "2007-02-27T02:00:00", "dateReserved": "2007-02-26T00:00:00", "dateUpdated": "2024-08-07T12:43:22.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0792
Vulnerability from cvelistv5
Published
2005-03-20 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in ZPanel 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter to index.php or (2) page parameter to zpanel.php.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/14602 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=111142323616309&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19709 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=111090324111053&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/12809 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-index-sql-injection(19709)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19709" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12809" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in ZPanel 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter to index.php or (2) page parameter to zpanel.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-index-sql-injection(19709)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19709" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12809" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in ZPanel 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter to index.php or (2) page parameter to zpanel.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-index-sql-injection(19709)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19709" }, { "name": "20050315 Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12809" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0792", "datePublished": "2005-03-20T05:00:00", "dateReserved": "2005-03-20T00:00:00", "dateUpdated": "2024-08-07T21:28:28.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2097
Vulnerability from cvelistv5
Published
2020-02-12 15:09
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
ZPanel through 10.1.0 has Remote Command Execution
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html | x_refsource_MISC | |
http://www.exploit-db.com/exploits/25519 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/05/16/12 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/05/16/16 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/84364 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/25519" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/16/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/16/16" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84364" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ZPanel", "vendor": "ZPanel", "versions": [ { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "ZPanel through 10.1.0 has Remote Command Execution" } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Command Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T15:09:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.exploit-db.com/exploits/25519" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/16/12" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/16/16" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84364" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ZPanel", "version": { "version_data": [ { "version_value": "10.1.0" } ] } } ] }, "vendor_name": "ZPanel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZPanel through 10.1.0 has Remote Command Execution" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Command Execution" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html" }, { "name": "http://www.exploit-db.com/exploits/25519", "refsource": "MISC", "url": "http://www.exploit-db.com/exploits/25519" }, { "name": "http://www.openwall.com/lists/oss-security/2013/05/16/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/05/16/12" }, { "name": "http://www.openwall.com/lists/oss-security/2013/05/16/16", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2013/05/16/16" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84364", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84364" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2097", "datePublished": "2020-02-12T15:09:01", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0793
Vulnerability from cvelistv5
Published
2005-03-20 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
PHP remote file inclusion vulnerability in zpanel.php in ZPanel allows remote attackers to (1) execute arbitrary PHP code in ZPanel 2.0 or (2) include local files in ZPanel 2.5 beta 10 and earlier by modifying the page parameter.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=111142323616309&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=bugtraq&m=111090324111053&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/12809 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12809" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in zpanel.php in ZPanel allows remote attackers to (1) execute arbitrary PHP code in ZPanel 2.0 or (2) include local files in ZPanel 2.5 beta 10 and earlier by modifying the page parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12809" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in zpanel.php in ZPanel allows remote attackers to (1) execute arbitrary PHP code in ZPanel 2.0 or (2) include local files in ZPanel 2.5 beta 10 and earlier by modifying the page parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20050320 Re: Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "20050315 Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" }, { "name": "12809", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12809" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0793", "datePublished": "2005-03-20T05:00:00", "dateReserved": "2005-03-20T00:00:00", "dateUpdated": "2024-08-07T21:28:28.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0794
Vulnerability from cvelistv5
Published
2005-03-20 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
ZPanel 2.0 and 2.5 beta 10 does not remove or protect installation scripts after they have been used, which allows remote attackers to reinstall the software and possibly cause a denial of service via a direct request to install.php.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/14602 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=111142323616309&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19711 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=111090324111053&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-reinstall-security-bypass(19711)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19711" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "ZPanel 2.0 and 2.5 beta 10 does not remove or protect installation scripts after they have been used, which allows remote attackers to reinstall the software and possibly cause a denial of service via a direct request to install.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14602", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-reinstall-security-bypass(19711)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19711" }, { "name": "20050315 Few remote bugs in zPanel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZPanel 2.0 and 2.5 beta 10 does not remove or protect installation scripts after they have been used, which allows remote attackers to reinstall the software and possibly cause a denial of service via a direct request to install.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14602", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14602" }, { "name": "20050320 Re: Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111142323616309\u0026w=2" }, { "name": "zpanel-reinstall-security-bypass(19711)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19711" }, { "name": "20050315 Few remote bugs in zPanel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111090324111053\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0794", "datePublished": "2005-03-20T05:00:00", "dateReserved": "2005-03-20T00:00:00", "dateUpdated": "2024-08-07T21:28:28.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }