Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Very High
CVE-2009-0545 — ZeroShell Remote Code Execution
Disclosure Date: February 12, 2009 (last updated November 24, 2024)
cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
1
Attacker Value
Unknown
CVE-2021-41738
Disclosure Date: June 11, 2022 (last updated October 07, 2023)
ZeroShell 3.9.5 has a command injection vulnerability in /cgi-bin/kerbynet IP parameter, which may allow an authenticated attacker to execute system commands.
0
Attacker Value
Unknown
CVE-2020-29390
Disclosure Date: November 30, 2020 (last updated February 22, 2025)
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
0
Attacker Value
Unknown
CVE-2019-12725
Disclosure Date: July 19, 2019 (last updated November 27, 2024)
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
0