Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
astaro security linux 6.001 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2005-3985
The Internet Key Exchange version 1 (IKEv1) implementation in Astaro Security Linux prior to 6.102 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NO...
Astaro Security Linux 6.001
Astaro Security Linux 6.002
Astaro Security Linux 6.101
7.5
CVSSv2
CVE-2005-2729
The HTTP proxy in Astaro Security Linux 6.0 does not properly filter HTTP CONNECT requests to localhost, which allows remote malicious users to bypass firewall rules and connect to local services.
Astaro Security Linux 6.001
1 EDB exploit
5
CVSSv2
CVE-2005-2730
The HTTP proxy in Astaro Security Linux 6.0 allows remote malicious users to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.
Astaro Security Linux 6.001
2.1
CVSSv2
CVE-2005-2731
Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.
Astaro Security Linux 6.001
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started