Lucene search

K
Andrew TridgellRsync

6 matches found

CVE
CVE
added 2004/10/20 4:0 a.m.79 views

CVE-2004-0792

Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.

6.4CVSS6.1AI score0.00839EPSS
CVE
CVE
added 2003/12/15 5:0 a.m.63 views

CVE-2003-0962

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.

7.5CVSS7.8AI score0.40719EPSS
CVE
CVE
added 2004/07/07 4:0 a.m.60 views

CVE-2004-0426

rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.

5CVSS6.3AI score0.02434EPSS
CVE
CVE
added 2006/04/28 9:2 p.m.44 views

CVE-2006-2083

Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.

7.5CVSS7.5AI score0.01506EPSS
CVE
CVE
added 2002/02/27 5:0 a.m.41 views

CVE-2002-0048

Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.

10CVSS7.5AI score0.6946EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.32 views

CVE-1999-0473

The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.

2.1CVSS7.1AI score0.00095EPSS