Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
engardelinux secure linux 1.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1240
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
Engardelinux Secure Linux 1.0.1
NA
CVE-2001-0739
Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.
Engardelinux Secure Linux 1.0.1
NA
CVE-2003-0962
Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.
Redhat Rsync 2.4.6-2
Andrew Tridgell Rsync 2.5.1
Engardelinux Secure Community 1.0.1
Redhat Rsync 2.5.5-1
Andrew Tridgell Rsync 2.5.5
Redhat Rsync 2.4.6-5
Engardelinux Secure Linux 1.2
Engardelinux Secure Linux 1.1
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.5.2
Andrew Tridgell Rsync 2.4.0
Redhat Rsync 2.5.4-2
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.4.8
Redhat Rsync 2.5.5-4
Andrew Tridgell Rsync 2.5.4
Andrew Tridgell Rsync 2.4.5
Engardelinux Secure Community 2.0
Andrew Tridgell Rsync 2.5.3
Andrew Tridgell Rsync 2.3.2
Engardelinux Secure Linux 1.5
Andrew Tridgell Rsync 2.4.4
NA
CVE-2001-0736
Vulnerability in (1) pine prior to 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
University Of Washington Pine
Immunix Immunix 7.0
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Engardelinux Secure Linux 1.0.1
Mandrakesoft Mandrake Linux 8.0
1 EDB exploit
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2002-0002
Format string vulnerability in stunnel prior to 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Stunnel Stunnel 3.21c
Stunnel Stunnel 3.7
Stunnel Stunnel 3.3
Stunnel Stunnel 3.21b
Stunnel Stunnel 3.14
Stunnel Stunnel 3.4a
Stunnel Stunnel 3.22
Stunnel Stunnel 3.18
Stunnel Stunnel 3.20
Stunnel Stunnel 3.15
Stunnel Stunnel 3.24
Stunnel Stunnel 3.11
Stunnel Stunnel 3.8
Stunnel Stunnel 3.21
Stunnel Stunnel 3.13
Stunnel Stunnel 3.17
Stunnel Stunnel 3.10
Stunnel Stunnel 3.16
Stunnel Stunnel 3.9
Stunnel Stunnel 3.12
Stunnel Stunnel 3.21a
Stunnel Stunnel 3.19
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started