Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
astaro security linux 6.001 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-2730
The HTTP proxy in Astaro Security Linux 6.0 allows remote malicious users to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.
Astaro Security Linux 6.001
2.1
CVSSv2
CVE-2005-2731
Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.
Astaro Security Linux 6.001
7.5
CVSSv2
CVE-2005-2729
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote malicious users to bypass firewall rules and connect to local services.
Astaro Security Linux 6.001
1 EDB exploit
7.8
CVSSv2
CVE-2005-3985
The Internet Key Exchange version 1 (IKEv1) implementation in Astaro Security Linux prior to 6.102 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NO...
Astaro Security Linux 6.001
Astaro Security Linux 6.002
Astaro Security Linux 6.101
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started