Vulnerabilities > Engardelinux

DATE CVE VULNERABILITY TITLE RISK
2004-08-06 CVE-2004-0535 The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. 2.1
2003-12-15 CVE-2003-0962 Remote Heap Overflow vulnerability in RSync Daemon Mode Undisclosed
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
network
low complexity
andrew-tridgell redhat engardelinux slackware
7.5
2003-03-03 CVE-2003-0101 miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
network
low complexity
engardelinux usermin webmin
critical
10.0
2002-03-15 CVE-2002-0083 Off-by-one Error vulnerability in multiple products
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
9.8
2002-01-31 CVE-2002-0002 Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
network
low complexity
stunnel engardelinux mandrakesoft redhat
7.5
2001-10-18 CVE-2001-0739 Denial-Of-Service vulnerability in Engardelinux Secure Linux 1.0.1
Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.
local
low complexity
engardelinux
7.2
2001-10-18 CVE-2001-0736 Local Security vulnerability in Linux Mandrake
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
2.1
2001-07-11 CVE-2001-1240 Unspecified vulnerability in Engardelinux Secure Linux 1.0.1
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
network
low complexity
engardelinux
critical
10.0