[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-34234":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T22:43:29.387Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":876,"aliases":877,"duplicate_of":9,"upstream":878,"downstream":879,"duplicates":880,"related":881,"reserved_at":9,"published_at":882,"modified_at":882,"state":883,"summary":884,"references_raw":891,"kevs":903,"epss":9,"epss_history":904,"metrics":905,"affected":911},"CVE-2026-34234","CtrlPanel is open-source billing software for hosting providers. In versions 1.1.1 and prior, the web-based installer (public/installer/index.php) is vulnerable to unauthenticated Remote Code Execution (RCE) because it performs the install.lock check only after including and executing form handler files, leaving installer endpoints reachable on already-installed instances. The handlers also pass unsanitized user input directly into shell commands, allowing an attacker to submit crafted requests that execute arbitrary commands on the server. The vulnerability stems from two combined weaknesses: (1) premature form handler execution before the lock file gate, and (2) unsafe use of user input in shell command construction. This issue is reported to be actively exploited in the wild. The issue has been fixed in version 1.2.0.",null,[11,40],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],{"_key":41,"id":41,"name":42,"description":43,"type":15,"status":44,"abstraction":45,"likelihood_of_exploit":9,"capec":46},"CWE-284","Improper Access Control","The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.","Incomplete","Pillar",[47,134,138,188,201,205,209,213,217,260,299,409,426,529,549,553,713],{"id":48,"name":49,"techniques":50},"CAPEC-19","Embedding Scripts within Scripts",[51,62,127],{"id":52,"name":53,"tactics":54,"countermeasures":61},"T1027.009","Embedded Payloads",[55,58],{"id":56,"name":57},"TA0030","Defense Evasion",{"id":59,"name":60},"TA0005","Stealth",[],{"id":63,"name":64,"tactics":65,"countermeasures":72},"T1546.004","Unix Shell Configuration Modification",[66,69],{"id":67,"name":68},"TA0111","Privilege Escalation",{"id":70,"name":71},"TA0110","Persistence",[73,78,82,86,91,96,101,106,111,115,119,123],{"id":74,"name":75,"tactic":76},"D3-FA","File Analysis",{"name":77},"Detect",{"id":79,"name":80,"tactic":81},"D3-FIM","File Integrity Monitoring",{"name":77},{"id":83,"name":84,"tactic":85},"D3-USICA","User Session Init Config Analysis",{"name":77},{"id":87,"name":88,"tactic":89},"D3-FEV","File Eviction",{"name":90},"Evict",{"id":92,"name":93,"tactic":94},"D3-DF","Decoy File",{"name":95},"Deceive",{"id":97,"name":98,"tactic":99},"D3-FE","File Encryption",{"name":100},"Harden",{"id":102,"name":103,"tactic":104},"D3-RF","Restore File",{"name":105},"Restore",{"id":107,"name":108,"tactic":109},"D3-CF","Content Filtering",{"name":110},"Isolate",{"id":112,"name":113,"tactic":114},"D3-LFP","Local File Permissions",{"name":110},{"id":116,"name":117,"tactic":118},"D3-RFAM","Remote File Access Mediation",{"name":110},{"id":120,"name":121,"tactic":122},"D3-CQ","Content Quarantine",{"name":110},{"id":124,"name":125,"tactic":126},"D3-CM","Content Modification",{"name":110},{"id":128,"name":129,"tactics":130,"countermeasures":133},"T1546.016","Installer Packages",[131,132],{"id":67,"name":68},{"id":70,"name":71},[],{"id":135,"name":136,"techniques":137},"CAPEC-441","Malicious Logic Insertion",[],{"id":139,"name":140,"techniques":141},"CAPEC-478","Modification of Windows Service Configuration",[142,169],{"id":143,"name":144,"tactics":145,"countermeasures":153},"T1574.011","Services Registry Permissions Weakness",[146,147,148,149,150],{"id":70,"name":71},{"id":67,"name":68},{"id":56,"name":57},{"id":59,"name":60},{"id":151,"name":152},"TA0104","Execution",[154,159,163,167],{"id":155,"name":156,"tactic":157},"D3-CI","Configuration Inventory",{"name":158},"Model",{"id":160,"name":161,"tactic":162},"D3-SICA","System Init Config Analysis",{"name":77},{"id":164,"name":165,"tactic":166},"D3-RC","Restore Configuration",{"name":105},{"id":120,"name":121,"tactic":168},{"name":110},{"id":170,"name":171,"tactics":172,"countermeasures":175},"T1543.003","Windows Service",[173,174],{"id":70,"name":71},{"id":67,"name":68},[176,180,184],{"id":177,"name":178,"tactic":179},"D3-DI","Data Inventory",{"name":158},{"id":181,"name":182,"tactic":183},"D3-SCP","System Configuration Permissions",{"name":100},{"id":185,"name":186,"tactic":187},"D3-RD","Restore Database",{"name":105},{"id":189,"name":190,"techniques":191},"CAPEC-479","Malicious Root Certificate",[192],{"id":193,"name":194,"tactics":195,"countermeasures":200},"T1553.004","Install Root Certificate",[196,197],{"id":56,"name":57},{"id":198,"name":199},"TA0112","Defense Impairment",[],{"id":202,"name":203,"techniques":204},"CAPEC-502","Intent Spoof",[],{"id":206,"name":207,"techniques":208},"CAPEC-503","WebView Exposure",[],{"id":210,"name":211,"techniques":212},"CAPEC-536","Data Injected During Configuration",[],{"id":214,"name":215,"techniques":216},"CAPEC-546","Incomplete Data Deletion in a Multi-Tenant Environment",[],{"id":218,"name":219,"techniques":220},"CAPEC-550","Install New Service",[221],{"id":222,"name":223,"tactics":224,"countermeasures":227},"T1543","Create or Modify System Process",[225,226],{"id":70,"name":71},{"id":67,"name":68},[228,230,232,234,238,240,242,244,246,248,250,252,254,256,258],{"id":177,"name":178,"tactic":229},{"name":158},{"id":74,"name":75,"tactic":231},{"name":77},{"id":79,"name":80,"tactic":233},{"name":77},{"id":235,"name":236,"tactic":237},"D3-SFA","System File Analysis",{"name":77},{"id":87,"name":88,"tactic":239},{"name":90},{"id":92,"name":93,"tactic":241},{"name":95},{"id":97,"name":98,"tactic":243},{"name":100},{"id":181,"name":182,"tactic":245},{"name":100},{"id":102,"name":103,"tactic":247},{"name":105},{"id":185,"name":186,"tactic":249},{"name":105},{"id":107,"name":108,"tactic":251},{"name":110},{"id":112,"name":113,"tactic":253},{"name":110},{"id":116,"name":117,"tactic":255},{"name":110},{"id":120,"name":121,"tactic":257},{"name":110},{"id":124,"name":125,"tactic":259},{"name":110},{"id":261,"name":262,"techniques":263},"CAPEC-551","Modify Existing Service",[264],{"id":222,"name":223,"tactics":265,"countermeasures":268},[266,267],{"id":70,"name":71},{"id":67,"name":68},[269,271,273,275,277,279,281,283,285,287,289,291,293,295,297],{"id":177,"name":178,"tactic":270},{"name":158},{"id":74,"name":75,"tactic":272},{"name":77},{"id":79,"name":80,"tactic":274},{"name":77},{"id":235,"name":236,"tactic":276},{"name":77},{"id":87,"name":88,"tactic":278},{"name":90},{"id":92,"name":93,"tactic":280},{"name":95},{"id":97,"name":98,"tactic":282},{"name":100},{"id":181,"name":182,"tactic":284},{"name":100},{"id":102,"name":103,"tactic":286},{"name":105},{"id":185,"name":186,"tactic":288},{"name":105},{"id":107,"name":108,"tactic":290},{"name":110},{"id":112,"name":113,"tactic":292},{"name":110},{"id":116,"name":117,"tactic":294},{"name":110},{"id":120,"name":121,"tactic":296},{"name":110},{"id":124,"name":125,"tactic":298},{"name":110},{"id":300,"name":301,"techniques":302},"CAPEC-552","Install Rootkit ",[303,360,380],{"id":304,"name":305,"tactics":306,"countermeasures":309},"T1014","Rootkit",[307,308],{"id":56,"name":57},{"id":59,"name":60},[310,314,318,320,322,326,330,334,336,338,340,344,346,350,352,354,356,358],{"id":311,"name":312,"tactic":313},"D3-SWI","Software Inventory",{"name":158},{"id":315,"name":316,"tactic":317},"D3-AVE","Asset Vulnerability Enumeration",{"name":158},{"id":74,"name":75,"tactic":319},{"name":77},{"id":79,"name":80,"tactic":321},{"name":77},{"id":323,"name":324,"tactic":325},"D3-FEMC","Firmware Embedded Monitoring Code",{"name":77},{"id":327,"name":328,"tactic":329},"D3-FV","Firmware Verification",{"name":77},{"id":331,"name":332,"tactic":333},"D3-FBA","Firmware Behavior Analysis",{"name":77},{"id":87,"name":88,"tactic":335},{"name":90},{"id":92,"name":93,"tactic":337},{"name":95},{"id":97,"name":98,"tactic":339},{"name":100},{"id":341,"name":342,"tactic":343},"D3-SU","Software Update",{"name":100},{"id":102,"name":103,"tactic":345},{"name":105},{"id":347,"name":348,"tactic":349},"D3-RS","Restore Software",{"name":105},{"id":107,"name":108,"tactic":351},{"name":110},{"id":112,"name":113,"tactic":353},{"name":110},{"id":116,"name":117,"tactic":355},{"name":110},{"id":120,"name":121,"tactic":357},{"name":110},{"id":124,"name":125,"tactic":359},{"name":110},{"id":361,"name":362,"tactics":363,"countermeasures":367},"T1542.003","Bootkit",[364,365,366],{"id":56,"name":57},{"id":59,"name":60},{"id":70,"name":71},[368,370,372,374,378],{"id":311,"name":312,"tactic":369},{"name":158},{"id":315,"name":316,"tactic":371},{"name":158},{"id":341,"name":342,"tactic":373},{"name":100},{"id":375,"name":376,"tactic":377},"D3-BA","Bootloader Authentication",{"name":100},{"id":347,"name":348,"tactic":379},{"name":105},{"id":381,"name":382,"tactics":383,"countermeasures":386},"T1547.006","Kernel Modules and Extensions",[384,385],{"id":70,"name":71},{"id":67,"name":68},[387,389,391,393,395,397,399,401,403,405,407],{"id":74,"name":75,"tactic":388},{"name":77},{"id":79,"name":80,"tactic":390},{"name":77},{"id":87,"name":88,"tactic":392},{"name":90},{"id":92,"name":93,"tactic":394},{"name":95},{"id":97,"name":98,"tactic":396},{"name":100},{"id":102,"name":103,"tactic":398},{"name":105},{"id":107,"name":108,"tactic":400},{"name":110},{"id":112,"name":113,"tactic":402},{"name":110},{"id":116,"name":117,"tactic":404},{"name":110},{"id":120,"name":121,"tactic":406},{"name":110},{"id":124,"name":125,"tactic":408},{"name":110},{"id":410,"name":411,"techniques":412},"CAPEC-556","Replace File Extension Handlers",[413],{"id":414,"name":415,"tactics":416,"countermeasures":419},"T1546.001","Change Default File Association",[417,418],{"id":67,"name":68},{"id":70,"name":71},[420,422,424],{"id":155,"name":156,"tactic":421},{"name":158},{"id":164,"name":165,"tactic":423},{"name":105},{"id":120,"name":121,"tactic":425},{"name":110},{"id":427,"name":428,"techniques":429},"CAPEC-558","Replace Trusted Executable",[430,436],{"id":431,"name":432,"tactics":433,"countermeasures":435},"T1505.005","Terminal Services DLL",[434],{"id":70,"name":71},[],{"id":437,"name":438,"tactics":439,"countermeasures":442},"T1546.008","Accessibility Features",[440,441],{"id":67,"name":68},{"id":70,"name":71},[443,445,447,449,453,457,461,465,469,473,477,481,485,489,493,497,499,501,503,505,507,509,511,513,515,517,521,525],{"id":155,"name":156,"tactic":444},{"name":158},{"id":74,"name":75,"tactic":446},{"name":77},{"id":79,"name":80,"tactic":448},{"name":77},{"id":450,"name":451,"tactic":452},"D3-DA","Dynamic Analysis",{"name":77},{"id":454,"name":455,"tactic":456},"D3-EFA","Emulated File Analysis",{"name":77},{"id":458,"name":459,"tactic":460},"D3-UGLPA","User Geolocation Logon Pattern Analysis",{"name":77},{"id":462,"name":463,"tactic":464},"D3-PMAD","Protocol Metadata Anomaly Detection",{"name":77},{"id":466,"name":467,"tactic":468},"D3-CSPP","Client-server Payload Profiling",{"name":77},{"id":470,"name":471,"tactic":472},"D3-PHDURA","Per Host Download-Upload Ratio Analysis",{"name":77},{"id":474,"name":475,"tactic":476},"D3-NTSA","Network Traffic Signature Analysis",{"name":77},{"id":478,"name":479,"tactic":480},"D3-APCA","Application Protocol Command Analysis",{"name":77},{"id":482,"name":483,"tactic":484},"D3-NTCD","Network Traffic Community Deviation",{"name":77},{"id":486,"name":487,"tactic":488},"D3-RTSD","Remote Terminal Session Detection",{"name":77},{"id":490,"name":491,"tactic":492},"D3-CAA","Connection Attempt Analysis",{"name":77},{"id":494,"name":495,"tactic":496},"D3-ANAA","Administrative Network Activity Analysis",{"name":77},{"id":87,"name":88,"tactic":498},{"name":90},{"id":92,"name":93,"tactic":500},{"name":95},{"id":97,"name":98,"tactic":502},{"name":100},{"id":102,"name":103,"tactic":504},{"name":105},{"id":164,"name":165,"tactic":506},{"name":105},{"id":107,"name":108,"tactic":508},{"name":110},{"id":112,"name":113,"tactic":510},{"name":110},{"id":116,"name":117,"tactic":512},{"name":110},{"id":120,"name":121,"tactic":514},{"name":110},{"id":124,"name":125,"tactic":516},{"name":110},{"id":518,"name":519,"tactic":520},"D3-EAL","Executable Allowlisting",{"name":110},{"id":522,"name":523,"tactic":524},"D3-EDL","Executable Denylisting",{"name":110},{"id":526,"name":527,"tactic":528},"D3-NTF","Network Traffic Filtering",{"name":110},{"id":530,"name":531,"techniques":532},"CAPEC-562","Modify Shared File",[533],{"id":534,"name":535,"tactics":536,"countermeasures":540},"T1080","Taint Shared Content",[537],{"id":538,"name":539},"TA0109","Lateral Movement",[541,545],{"id":542,"name":543,"tactic":544},"D3-DNR","Decoy Network Resource",{"name":95},{"id":546,"name":547,"tactic":548},"D3-NRAM","Network Resource Access Mediation",{"name":110},{"id":550,"name":551,"techniques":552},"CAPEC-563","Add Malicious File to Shared Webroot",[],{"id":554,"name":555,"techniques":556},"CAPEC-564","Run Software at Logon",[557,604,633,662],{"id":558,"name":559,"tactics":560,"countermeasures":563},"T1037","Boot or Logon Initialization Scripts",[561,562],{"id":70,"name":71},{"id":67,"name":68},[564,566,568,570,572,574,576,578,580,582,584,586,588,590,592,594,596,598,600,602],{"id":155,"name":156,"tactic":565},{"name":158},{"id":74,"name":75,"tactic":567},{"name":77},{"id":79,"name":80,"tactic":569},{"name":77},{"id":450,"name":451,"tactic":571},{"name":77},{"id":454,"name":455,"tactic":573},{"name":77},{"id":160,"name":161,"tactic":575},{"name":77},{"id":87,"name":88,"tactic":577},{"name":90},{"id":92,"name":93,"tactic":579},{"name":95},{"id":542,"name":543,"tactic":581},{"name":95},{"id":97,"name":98,"tactic":583},{"name":100},{"id":102,"name":103,"tactic":585},{"name":105},{"id":164,"name":165,"tactic":587},{"name":105},{"id":107,"name":108,"tactic":589},{"name":110},{"id":112,"name":113,"tactic":591},{"name":110},{"id":116,"name":117,"tactic":593},{"name":110},{"id":120,"name":121,"tactic":595},{"name":110},{"id":124,"name":125,"tactic":597},{"name":110},{"id":518,"name":519,"tactic":599},{"name":110},{"id":522,"name":523,"tactic":601},{"name":110},{"id":546,"name":547,"tactic":603},{"name":110},{"id":605,"name":606,"tactics":607,"countermeasures":610},"T1543.001","Launch Agent",[608,609],{"id":70,"name":71},{"id":67,"name":68},[611,613,615,617,619,621,623,625,627,629,631],{"id":74,"name":75,"tactic":612},{"name":77},{"id":79,"name":80,"tactic":614},{"name":77},{"id":87,"name":88,"tactic":616},{"name":90},{"id":92,"name":93,"tactic":618},{"name":95},{"id":97,"name":98,"tactic":620},{"name":100},{"id":102,"name":103,"tactic":622},{"name":105},{"id":107,"name":108,"tactic":624},{"name":110},{"id":112,"name":113,"tactic":626},{"name":110},{"id":116,"name":117,"tactic":628},{"name":110},{"id":120,"name":121,"tactic":630},{"name":110},{"id":124,"name":125,"tactic":632},{"name":110},{"id":634,"name":635,"tactics":636,"countermeasures":639},"T1543.004","Launch Daemon",[637,638],{"id":70,"name":71},{"id":67,"name":68},[640,642,644,646,648,650,652,654,656,658,660],{"id":74,"name":75,"tactic":641},{"name":77},{"id":79,"name":80,"tactic":643},{"name":77},{"id":87,"name":88,"tactic":645},{"name":90},{"id":92,"name":93,"tactic":647},{"name":95},{"id":97,"name":98,"tactic":649},{"name":100},{"id":102,"name":103,"tactic":651},{"name":105},{"id":107,"name":108,"tactic":653},{"name":110},{"id":112,"name":113,"tactic":655},{"name":110},{"id":116,"name":117,"tactic":657},{"name":110},{"id":120,"name":121,"tactic":659},{"name":110},{"id":124,"name":125,"tactic":661},{"name":110},{"id":663,"name":664,"tactics":665,"countermeasures":668},"T1547","Boot or Logon Autostart Execution",[666,667],{"id":70,"name":71},{"id":67,"name":68},[669,671,673,675,677,679,681,683,685,687,689,691,693,695,697,699,701,703,705,707,709,711],{"id":155,"name":156,"tactic":670},{"name":158},{"id":311,"name":312,"tactic":672},{"name":158},{"id":315,"name":316,"tactic":674},{"name":158},{"id":74,"name":75,"tactic":676},{"name":77},{"id":79,"name":80,"tactic":678},{"name":77},{"id":160,"name":161,"tactic":680},{"name":77},{"id":450,"name":451,"tactic":682},{"name":77},{"id":454,"name":455,"tactic":684},{"name":77},{"id":87,"name":88,"tactic":686},{"name":90},{"id":92,"name":93,"tactic":688},{"name":95},{"id":97,"name":98,"tactic":690},{"name":100},{"id":341,"name":342,"tactic":692},{"name":100},{"id":102,"name":103,"tactic":694},{"name":105},{"id":164,"name":165,"tactic":696},{"name":105},{"id":347,"name":348,"tactic":698},{"name":105},{"id":107,"name":108,"tactic":700},{"name":110},{"id":112,"name":113,"tactic":702},{"name":110},{"id":116,"name":117,"tactic":704},{"name":110},{"id":120,"name":121,"tactic":706},{"name":110},{"id":124,"name":125,"tactic":708},{"name":110},{"id":518,"name":519,"tactic":710},{"name":110},{"id":522,"name":523,"tactic":712},{"name":110},{"id":714,"name":715,"techniques":716},"CAPEC-578","Disable Security Software",[717,776,809,828,839,850,861],{"id":718,"name":719,"tactics":720,"countermeasures":727},"T1556.006","Multi-Factor Authentication",[721,722,723,724],{"id":56,"name":57},{"id":198,"name":199},{"id":70,"name":71},{"id":725,"name":726},"TA0031","Credential Access",[728,732,736,740,744,748,752,756,760,764,768,772],{"id":729,"name":730,"tactic":731},"D3-PLA","Process Lineage Analysis",{"name":77},{"id":733,"name":734,"tactic":735},"D3-PSMD","Process Self-Modification Detection",{"name":77},{"id":737,"name":738,"tactic":739},"D3-PSA","Process Spawn Analysis",{"name":77},{"id":741,"name":742,"tactic":743},"D3-PT","Process Termination",{"name":90},{"id":745,"name":746,"tactic":747},"D3-PS","Process Suspension",{"name":90},{"id":749,"name":750,"tactic":751},"D3-HR","Host Reboot",{"name":90},{"id":753,"name":754,"tactic":755},"D3-HS","Host Shutdown",{"name":90},{"id":757,"name":758,"tactic":759},"D3-KBPI","Kernel-based Process Isolation",{"name":110},{"id":761,"name":762,"tactic":763},"D3-SCF","System Call Filtering",{"name":110},{"id":765,"name":766,"tactic":767},"D3-HBPI","Hardware-based Process Isolation",{"name":110},{"id":769,"name":770,"tactic":771},"D3-ABPI","Application-based Process Isolation",{"name":110},{"id":773,"name":774,"tactic":775},"D3-WSAM","Web Session Access Mediation",{"name":110},{"id":777,"name":778,"tactics":779,"countermeasures":782},"T1562.001","Disable or Modify Tools",[780,781],{"id":56,"name":57},{"id":59,"name":60},[783,785,787,789,793,795,797,799,801,803,805,807],{"id":729,"name":730,"tactic":784},{"name":77},{"id":733,"name":734,"tactic":786},{"name":77},{"id":737,"name":738,"tactic":788},{"name":77},{"id":790,"name":791,"tactic":792},"D3-SDM","System Daemon Monitoring",{"name":77},{"id":741,"name":742,"tactic":794},{"name":90},{"id":745,"name":746,"tactic":796},{"name":90},{"id":749,"name":750,"tactic":798},{"name":90},{"id":753,"name":754,"tactic":800},{"name":90},{"id":757,"name":758,"tactic":802},{"name":110},{"id":761,"name":762,"tactic":804},{"name":110},{"id":765,"name":766,"tactic":806},{"name":110},{"id":769,"name":770,"tactic":808},{"name":110},{"id":810,"name":811,"tactics":812,"countermeasures":815},"T1562.002","Disable Windows Event Logging",[813,814],{"id":56,"name":57},{"id":59,"name":60},[816,818,822,826],{"id":155,"name":156,"tactic":817},{"name":158},{"id":819,"name":820,"tactic":821},"D3-DRA","Disable Remote Access",{"name":100},{"id":823,"name":824,"tactic":825},"D3-ACH","Application Configuration Hardening",{"name":100},{"id":164,"name":165,"tactic":827},{"name":105},{"id":829,"name":830,"tactics":831,"countermeasures":834},"T1562.004","Disable or Modify System Firewall",[832,833],{"id":56,"name":57},{"id":59,"name":60},[835,837],{"id":155,"name":156,"tactic":836},{"name":158},{"id":164,"name":165,"tactic":838},{"name":105},{"id":840,"name":841,"tactics":842,"countermeasures":845},"T1562.007","Disable or Modify Cloud Firewall",[843,844],{"id":56,"name":57},{"id":59,"name":60},[846,848],{"id":155,"name":156,"tactic":847},{"name":158},{"id":164,"name":165,"tactic":849},{"name":105},{"id":851,"name":852,"tactics":853,"countermeasures":856},"T1562.008","Disable or Modify Cloud Logs",[854,855],{"id":56,"name":57},{"id":59,"name":60},[857,859],{"id":155,"name":156,"tactic":858},{"name":158},{"id":164,"name":165,"tactic":860},{"name":105},{"id":862,"name":863,"tactics":864,"countermeasures":867},"T1562.009","Safe Mode Boot",[865,866],{"id":56,"name":57},{"id":59,"name":60},[868,870,872,874],{"id":155,"name":156,"tactic":869},{"name":158},{"id":160,"name":161,"tactic":871},{"name":77},{"id":164,"name":165,"tactic":873},{"name":105},{"id":120,"name":121,"tactic":875},{"name":110},[],[],[],[],[],[],"2026-05-19T21:03:05.274Z","Received",{"cisa_kev":885,"cisa_ransomware":885,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":886,"severity_score":887,"severity_version":888,"severity_source":889,"severity_vector":890,"severity_status":883},false,"critical",10,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",[892,898],{"url":893,"sources":894,"tags":896},"https://github.com/Ctrlpanel-gg/panel/security/advisories/GHSA-jmhr-q9q5-fqwh",[889,895],"nvd",[897],"X Refsource CONFIRM",{"url":899,"sources":900,"tags":901},"https://github.com/Ctrlpanel-gg/panel/releases/tag/1.2.0",[889,895],[902],"X Refsource MISC",[],[],[906,909],{"source":889,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":907,"cvss_v4_0":9},{"baseScore":887,"baseSeverity":908,"vectorString":890,"impactScore":887,"exploitabilityScore":887},"CRITICAL",{"source":895,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":910,"cvss_v4_0":9},{"baseScore":887,"baseSeverity":908,"vectorString":890,"impactScore":887,"exploitabilityScore":887},[912],{"ecosystem":9,"name":913,"vendor":914,"product":913,"cpe_part":915,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":916},"panel","ctrlpanel-gg","a",[917],{"version":918,"is_range":919,"range_type":889,"version_start":9,"version_start_type":9,"version_end":920,"version_end_type":921,"fixed_in":9},"\u003C 1.2.0",true,"1.2.0","excluding"]