Unspecified vulnerability in stunnel before 4.23, when running as a service on Windows, allows local users to gain privileges via unknown attack vectors.
2008-05-22T13:09:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | stunnel | stunnel | 0.1 | Yes |
Application | stunnel | stunnel | 1.0 | Yes |
Application | stunnel | stunnel | 1.1 | Yes |
Application | stunnel | stunnel | 1.2 | Yes |
Application | stunnel | stunnel | 1.3 | Yes |
Application | stunnel | stunnel | 1.4 | Yes |
Application | stunnel | stunnel | 1.5 | Yes |
Application | stunnel | stunnel | 1.6 | Yes |
Application | stunnel | stunnel | 2.0 | Yes |
Application | stunnel | stunnel | 2.1 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.0 | Yes |
Application | stunnel | stunnel | 3.1 | Yes |
Application | stunnel | stunnel | 3.2 | Yes |
Application | stunnel | stunnel | 3.3 | Yes |
Application | stunnel | stunnel | 3.4a | Yes |
Application | stunnel | stunnel | 3.5 | Yes |
Application | stunnel | stunnel | 3.6 | Yes |
Application | stunnel | stunnel | 3.7 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.8 | Yes |
Application | stunnel | stunnel | 3.9 | Yes |
Application | stunnel | stunnel | 3.10 | Yes |
Application | stunnel | stunnel | 3.11 | Yes |
Application | stunnel | stunnel | 3.12 | Yes |
Application | stunnel | stunnel | 3.13 | Yes |
Application | stunnel | stunnel | 3.14 | Yes |
Application | stunnel | stunnel | 3.15 | Yes |
Application | stunnel | stunnel | 3.16 | Yes |
Application | stunnel | stunnel | 3.17 | Yes |
Application | stunnel | stunnel | 3.18 | Yes |
Application | stunnel | stunnel | 3.19 | Yes |
Application | stunnel | stunnel | 3.20 | Yes |
Application | stunnel | stunnel | 3.21 | Yes |
Application | stunnel | stunnel | 3.21a | Yes |
Application | stunnel | stunnel | 3.21b | Yes |
Application | stunnel | stunnel | 3.21c | Yes |
Application | stunnel | stunnel | 3.22 | Yes |
Application | stunnel | stunnel | 3.24 | Yes |
Application | stunnel | stunnel | 4.0 | Yes |
Application | stunnel | stunnel | 4.01 | Yes |
Application | stunnel | stunnel | 4.02 | Yes |
Application | stunnel | stunnel | 4.03 | Yes |
Application | stunnel | stunnel | 4.04 | Yes |
Application | stunnel | stunnel | 4.05 | Yes |
Application | stunnel | stunnel | 4.06 | Yes |
Application | stunnel | stunnel | 4.07 | Yes |
Application | stunnel | stunnel | 4.08 | Yes |
Application | stunnel | stunnel | 4.09 | Yes |
Application | stunnel | stunnel | 4.10 | Yes |
Application | stunnel | stunnel | 4.11 | Yes |
Application | stunnel | stunnel | 4.12 | Yes |
Application | stunnel | stunnel | 4.13 | Yes |
Application | stunnel | stunnel | 4.14 | Yes |
Application | stunnel | stunnel | 4.15 | Yes |
Application | stunnel | stunnel | 4.16 | Yes |
Application | stunnel | stunnel | 4.17 | Yes |
Application | stunnel | stunnel | 4.18 | Yes |
Application | stunnel | stunnel | 4.19 | Yes |
Application | stunnel | stunnel | 4.20 | Yes |
Application | stunnel | stunnel | 4.21 | Yes |
Application | stunnel | stunnel | 4.22 | Yes |