Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
engardelinux secure linux 1.0.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2001-0739
Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.
Engardelinux Secure Linux 1.0.1
10
CVSSv2
CVE-2001-1240
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
Engardelinux Secure Linux 1.0.1
7.5
CVSSv2
CVE-2003-0962
Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.
Andrew Tridgell Rsync 2.4.4
Andrew Tridgell Rsync 2.4.5
Andrew Tridgell Rsync 2.5.5
Andrew Tridgell Rsync 2.5.6
Engardelinux Secure Community 1.0.1
Engardelinux Secure Community 2.0
Andrew Tridgell Rsync 2.4.1
Andrew Tridgell Rsync 2.4.3
Andrew Tridgell Rsync 2.5.2
Andrew Tridgell Rsync 2.5.3
Andrew Tridgell Rsync 2.5.4
Redhat Rsync 2.5.5-1
Redhat Rsync 2.5.5-4
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.4.8
Redhat Rsync 2.4.6-2
Redhat Rsync 2.4.6-5
Engardelinux Secure Linux 1.1
Engardelinux Secure Linux 1.2
Andrew Tridgell Rsync 2.3.2
Andrew Tridgell Rsync 2.4.0
2.1
CVSSv2
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
Immunix Immunix 7.0 Beta
University Of Washington Pine
Immunix Immunix 6.2
Immunix Immunix 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 5.2
1 EDB exploit
10
CVSSv2
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
7.5
CVSSv2
CVE-2002-0002
Format string vulnerability in stunnel prior to 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Stunnel Stunnel 3.14
Stunnel Stunnel 3.15
Stunnel Stunnel 3.16
Stunnel Stunnel 3.21b
Stunnel Stunnel 3.21c
Stunnel Stunnel 3.9
Stunnel Stunnel 3.12
Stunnel Stunnel 3.13
Stunnel Stunnel 3.21
Stunnel Stunnel 3.21a
Stunnel Stunnel 3.7
Stunnel Stunnel 3.8
Stunnel Stunnel 3.17
Stunnel Stunnel 3.18
Stunnel Stunnel 3.22
Stunnel Stunnel 3.24
Stunnel Stunnel 3.10
Stunnel Stunnel 3.11
Stunnel Stunnel 3.19
Stunnel Stunnel 3.20
Stunnel Stunnel 3.3
Stunnel Stunnel 3.4a
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started