CVE-2013-2097

ZPanel through 10.1.0 has Remote Command Execution
Configurations

Configuration 1 (hide)

cpe:2.3:a:zpanel_project:zpanel:10.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:51

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/134030/Zpanel-10.1.0-Remote-Unauthenticated-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.exploit-db.com/exploits/25519 - Exploit, Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/25519 - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2013/05/16/12 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/05/16/12 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2013/05/16/16 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/05/16/16 - Mailing List, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/84364 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/84364 - Third Party Advisory, VDB Entry

Information

Published : 2020-02-12 16:15

Updated : 2024-11-21 01:51


NVD link : CVE-2013-2097

Mitre link : CVE-2013-2097

CVE.ORG link : CVE-2013-2097


JSON object : View

Products Affected

zpanel_project

  • zpanel