-
Details
-
- ZSA-2024-1 - JetBackup < 5.3.14.1 SSH destination plugin < 1.1.4 root RCE on files restore
- ZSA-2022-1 - Thunderbird Labels < 1.4.13 plugin for Roundcube remote code execution
- ZSA-2021-3 - PHP X-Ray < 0.3-10 local privilege escalation to root
- ZSA-2021-2 - SitePad Website Builder < 1.5.4 local privilege escalation to root
- ZSA-2021-1 - Softaculous Auto Installer < 5.6.5 local privilege escalation to root
- ZSA-2020-5 - DirectAdmin Exim BlockCracking < 1.12 local privilege escalation to mail
- ZSA-2020-4 - DirectAdmin < 1.60.4 custom all_pre.sh script (possibly other) local privilege escalation to root
- ZSA-2020-3 - DirectAdmin < 1.60.3 mailing list creation local privilege escalation to root
- ZSA-2020-2 - DirectAdmin < 1.60.2 reflected XSS in CMD_EMAIL_FILTER and CMD_EMAIL_FORWARDER
- ZSA-2020-1 - patches.kernelcare.com XSS
- ZSA-2019-9 - DirectAdmin < 1.58.2 user logfiles compression system files overwrite
- ZSA-2019-8 - DirectAdmin < 1.58.2 file manager owner reset local privilege escalation to root through symlinks
- ZSA-2019-7 - DirectAdmin < 1.58.2 webalizer local privilege escalation to root through symlinks
- ZSA-2019-6 - DirectAdmin < 1.56 CSRF (check_referer bypass)
- ZSA-2019-5 - CloudLinux fs.protected_symlinks_create bypass
- ZSA-2019-4 - CloudLinux CageFS bypass in phpselector for DirectAdmin
- ZSA-2019-3 - CloudLinux MySQL Governor requirement of fs.suid_dumpable=1 opens security holes
- ZSA-2019-2 - CloudLinux CageFS bypass by creating user with existing exception
- ZSA-2019-1 - CloudLinux MySQL Governor DoS by user from inside CageFS
- ZSA-2017-2 - DirectAdmin < 1.51 awstats local privilege escalation to root through symlinks
- ZSA-2017-1 - CloudLinux CageFS bypass in phpselector for DirectAdmin
- ZSA-2016-2 - CloudLinux CageFS bypass through at
- ZSA-2016-1 - CloudLinux CageFS bypass through exim