Vulnerability Details : CVE-2005-1932
Lpanel 1.59 and earlier, and other versions before 1.597, allows remote authenticated users to modify certain critical variables and (1) modify DNS settings for arbitrary domains via the domain parameter to diagnose.php, (2) close, open, or respond to arbitrary support tickets via the close, open, or pid parameter to view_ticket.php, (3) obtain sensitive information on arbitrary invoices via the inv parameter to viewreceipt.php, or (4) modify domain information for arbitrary domains via the editdomain parameter to domains.php.
Products affected by CVE-2005-1932
- cpe:2.3:a:lpanel:lpanel:1.59:*:*:*:*:*:*:*
- cpe:2.3:a:lpanel:lpanel:1.594:*:*:*:*:*:*:*
- cpe:2.3:a:lpanel:lpanel:1.596:*:*:*:*:*:*:*
- cpe:2.3:a:lpanel:lpanel:1.593:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1932
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1932
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST |
References for CVE-2005-1932
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034414.html
Vendor Advisory
-
http://www.securityfocus.com/bid/13869
Patch
-
http://www.lpanel.net/changelog.php
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034416.html
Vendor Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034419.html
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034415.html
Vendor Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034418.html
Vendor Advisory
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034417.html
Vendor Advisory
Jump to