mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
103 lines
4.2 KiB
JSON
103 lines
4.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2005-1932",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Lpanel 1.59 and earlier, and other versions before 1.597, allows remote authenticated users to modify certain critical variables and (1) modify DNS settings for arbitrary domains via the domain parameter to diagnose.php, (2) close, open, or respond to arbitrary support tickets via the close, open, or pid parameter to view_ticket.php, (3) obtain sensitive information on arbitrary invoices via the inv parameter to viewreceipt.php, or (4) modify domain information for arbitrary domains via the editdomain parameter to domains.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to close any support ticket within the system.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034414.html"
|
|
},
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to open any support ticket within the system.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034415.html"
|
|
},
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to reset the DNS information of any domain name managed by the system.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034419.html"
|
|
},
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable to the unauthorized viewing of client invoice information.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034417.html"
|
|
},
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable to unauthorized domain management access.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034416.html"
|
|
},
|
|
{
|
|
"name" : "20050606 Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to respond to any support ticket on the system.",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034418.html"
|
|
},
|
|
{
|
|
"name" : "http://www.lpanel.net/changelog.php",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.lpanel.net/changelog.php"
|
|
},
|
|
{
|
|
"name" : "13869",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/13869"
|
|
},
|
|
{
|
|
"name" : "15589",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/15589/"
|
|
}
|
|
]
|
|
}
|
|
}
|