• ZSA-2024-1 - JetBackup < 5.3.14.1 SSH destination plugin < 1.1.4 root RCE on files restore
  • ZSA-2022-1 - Thunderbird Labels < 1.4.13 plugin for Roundcube remote code execution
  • ZSA-2021-3 - PHP X-Ray < 0.3-10 local privilege escalation to root
  • ZSA-2021-2 - SitePad Website Builder < 1.5.4 local privilege escalation to root
  • ZSA-2021-1 - Softaculous Auto Installer < 5.6.5 local privilege escalation to root
  • ZSA-2020-5 - DirectAdmin Exim BlockCracking < 1.12 local privilege escalation to mail
  • ZSA-2020-4 - DirectAdmin < 1.60.4 custom all_pre.sh script (possibly other) local privilege escalation to root
  • ZSA-2020-3 - DirectAdmin < 1.60.3 mailing list creation local privilege escalation to root
  • ZSA-2020-2 - DirectAdmin < 1.60.2 reflected XSS in CMD_EMAIL_FILTER and CMD_EMAIL_FORWARDER
  • ZSA-2020-1 - patches.kernelcare.com XSS
  • ZSA-2019-9 - DirectAdmin < 1.58.2 user logfiles compression system files overwrite
  • ZSA-2019-8 - DirectAdmin < 1.58.2 file manager owner reset local privilege escalation to root through symlinks
  • ZSA-2019-7 - DirectAdmin < 1.58.2 webalizer local privilege escalation to root through symlinks
  • ZSA-2019-6 - DirectAdmin < 1.56 CSRF (check_referer bypass)
  • ZSA-2019-5 - CloudLinux fs.protected_symlinks_create bypass
  • ZSA-2019-4 - CloudLinux CageFS bypass in phpselector for DirectAdmin
  • ZSA-2019-3 - CloudLinux MySQL Governor requirement of fs.suid_dumpable=1 opens security holes
  • ZSA-2019-2 - CloudLinux CageFS bypass by creating user with existing exception
  • ZSA-2019-1 - CloudLinux MySQL Governor DoS by user from inside CageFS
  • ZSA-2017-2 - DirectAdmin < 1.51 awstats local privilege escalation to root through symlinks
  • ZSA-2017-1 - CloudLinux CageFS bypass in phpselector for DirectAdmin
  • ZSA-2016-2 - CloudLinux CageFS bypass through at
  • ZSA-2016-1 - CloudLinux CageFS bypass through exim