
CVE-2020-15609 – CentOS Web Panel ajax_dashboard service_stop Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-15609
25 Jun 2020 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-20-756 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-5291 – Privilege escalation in setuid mode via user namespaces in Bubblewrap
https://notcve.org/view.php?id=CVE-2020-5291
31 Mar 2020 — Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that this only affects the combination of bubblewrap in setuid mode (which is typically used when unprivileged user namespaces are not supported) and the support of unprivileged user namespaces. Known to be affected ... • https://github.com/containers/bubblewrap/commit/1f7e2ad948c051054b683461885a0215f1806240 • CWE-269: Improper Privilege Management CWE-648: Incorrect Use of Privileged APIs •

CVE-2019-19906 – cyrus-sasl: denial of service in _sasl_add_string function
https://notcve.org/view.php?id=CVE-2019-19906
19 Dec 2019 — cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl. cyrus-sasl (también se conoce como Cyrus SASL) versión 2.1.27, presenta una escritura fuera de límites conllevando a una denegación de servicio remota no autenticada en OpenLDAP por medio de un paquete LDAP malformado. El bloqueo de OpenLDAP es ca... • http://seclists.org/fulldisclosure/2020/Jul/23 • CWE-193: Off-by-one Error CWE-400: Uncontrolled Resource Consumption CWE-787: Out-of-bounds Write •

CVE-2019-14245 – CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop
https://notcve.org/view.php?id=CVE-2019-14245
20 Aug 2019 — In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to delete databases (such as oauthv2) from the server via an attacker account. En CentOS-WebPanel.com (también conocido como CWP) CentOS Web Panel versión 0.9.8.851, una referencia de objeto insegura permite a un atacante eliminar bases de datos (como oauthv2) del servidor a través de una cuenta de atacante. CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary datab... • https://packetstorm.news/files/id/154155 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2019-14246 – CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change
https://notcve.org/view.php?id=CVE-2019-14246
20 Aug 2019 — In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.851, an insecure object reference allows an attacker to discover phpMyAdmin passwords (of any user in /etc/passwd) via an attacker account. En CentOS-WebPanel.com (también conocido como CWP) CentOS Web Panel versión 0.9.8.851, una referencia de objeto insegura permite a un atacante descubrir contraseñas phpMyAdmin (de cualquier usuario en / etc / passwd) a través de una cuenta de atacante. CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 a... • https://packetstorm.news/files/id/154156 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2019-13386 – CentOS-WebPanel.com Control Web Panel 0.9.8.836 Remote Command Execution
https://notcve.org/view.php?id=CVE-2019-13386
26 Jul 2019 — In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, a hidden action=9 feature in filemanager2.php allows attackers to execute a shell command, i.e., obtain a reverse shell with user privilege. En CentOS Web Panel de CentOS-WebPanel.com (también se conoce como CWP) versión 0.9.8.846, una característica action=9 oculta en el archivo filemanager2.php, permite a los atacantes ejecutar un comando de shell, es decir, obtener un shell inverso con privilegios de usuario. CentOS-WebPanel.com Control Web Pan... • https://packetstorm.news/files/id/153876 • CWE-863: Incorrect Authorization •

CVE-2019-10893 – CentOS Web Panel 0.9.8.793 (Free) / 0.9.8.753 (Pro) - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2019-10893
08 Apr 2019 — CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute. CentOS-WebPanel.com (también conocido CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) y 0.9.8.753 (Pro) es vulnerable a Corss-Site Scripting (XSS) almacenado/persistente en el campo "A... • https://packetstorm.news/files/id/152437 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-10261 – CentOS Web Panel 0.9.8.789 - NameServer Field Persistent Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2019-10261
29 Mar 2019 — CentOS Web Panel (CWP) 0.9.8.789 is vulnerable to Stored/Persistent XSS for the "Name Server 1" and "Name Server 2" fields via a "DNS Functions" "Edit Nameservers IPs" action. El panel web CentOS (CWP) 0.9.8.789 es vulnerable a Cross-Site Scripting (XSS) persistente en los campos "Name Server 1" y "Name Server 2" mediante una acción "DNS Functions" "Edit Nameservers IPs". CentOS Web Panel version 0.9.8.78 suffers from a persistent cross site scripting vulnerability. • https://packetstorm.news/files/id/152303 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-1000253 – Linux Kernel PIE Stack Buffer Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2017-1000253
26 Sep 2017 — Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE bi... • https://www.exploit-db.com/exploits/42887 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-4144 – EMC Documentum Content Server Privilege Escalation
https://notcve.org/view.php?id=CVE-2011-4144
02 Feb 2012 — Unspecified vulnerability in EMC Documentum Content Server 6.0, 6.5 before SP2 P02, 6.5 SP3 before SP3 P02, and 6.6 before P02 allows local users to obtain "highest super user privileges" by leveraging system administrator privileges. Vulnerabilidad sin especificar en EMC Documentum Content Server 6.0, 6.5 anteriores a SP2 P02, 6.5 SP3 anteriores a SP3 P02 y 6.6 anteriores a P02 permite a usuarios locales obtener "privilegios de usuarios muy elevados" utilizando privilegios de administrador system. EMC Docu... • https://packetstorm.news/files/id/133143 •