Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rssh rssh 2.2.1 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2005-3345
rssh 2.0.0 up to and including 2.2.3 allows local users to bypass access restrictions and gain root privileges by using the rssh_chroot_helper command to chroot to an external directory.
Rssh Rssh 2.2.3
Rssh Rssh 2.1
Rssh Rssh 2.2
Rssh Rssh 2.2.1
Rssh Rssh 2.2.2
Rssh Rssh 2.0
755
VMScore
CVE-2004-1161
rssh 2.2.2 and previous versions does not properly restrict programs that can be run, which could allow remote authenticated users to bypass intended access restrictions and execute arbitrary programs via (1) rdist -P, (2) rsync, or (3) scp -S.
Rssh Rssh 2.2.1
Rssh Rssh 2.2.2
Rssh Rssh 2.0
Rssh Rssh 2.1
Rssh Rssh 2.2
Gentoo Linux
1 EDB exploit
392
VMScore
CVE-2012-2252
Incomplete blacklist vulnerability in rssh prior to 2.3.4, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via the --rsh command line option.
Pizzashack Rssh 2.2.2
Pizzashack Rssh 2.2.1
Pizzashack Rssh 2.0.0
Pizzashack Rssh 2.3.1
Pizzashack Rssh 2.3.0
Pizzashack Rssh 2.2.3
Pizzashack Rssh 2.0.2
Pizzashack Rssh 2.0.1
Pizzashack Rssh 2.1.0
Pizzashack Rssh 2.1.1
Pizzashack Rssh
Pizzashack Rssh 2.3.2
Pizzashack Rssh 2.0.4
Pizzashack Rssh 2.0.3
187
VMScore
CVE-2012-3478
rssh 2.3.3 and previous versions allows local users to bypass intended restricted shell access via crafted environment variables in the command line.
Pizzashack Rssh 2.0.3
Pizzashack Rssh 2.0.4
Pizzashack Rssh 2.2.3
Pizzashack Rssh 2.0.2
Pizzashack Rssh
Pizzashack Rssh 2.1.0
Pizzashack Rssh 2.1.1
Pizzashack Rssh 2.0.0
Pizzashack Rssh 2.2.1
Pizzashack Rssh 2.2.2
Pizzashack Rssh 2.0.1
Pizzashack Rssh 2.3.1
Pizzashack Rssh 2.3.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started