| CVE-2002-0048 | | 0.10 | — | 0.82 | | Feb 27, 2002 | Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server. |
| CVE-2003-0962 | | 0.04 | — | 0.44 | | Dec 15, 2003 | Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail. |
| CVE-2006-2083 | | 0.00 | — | 0.02 | | Apr 28, 2006 | Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow. |
| CVE-2004-0792 | | 0.00 | — | 0.01 | | Oct 20, 2004 | Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files. |
| CVE-2004-0426 | | 0.00 | — | 0.03 | | Jul 7, 2004 | rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path. |
| CVE-1999-0473 | | 0.00 | — | 0.00 | | Apr 7, 1999 | The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred. |