Vulnerabilities (CVE)

Filtered by vendor Engardelinux Subscribe
Filtered by product Secure Linux
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2002-0083 9 Conectiva, Engardelinux, Immunix and 6 more 11 Linux, Secure Linux, Immunix and 8 more 2024-02-02 10.0 HIGH 9.8 CRITICAL
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
CVE-2004-0535 6 Conectiva, Engardelinux, Gentoo and 3 more 17 Linux, Secure Community, Secure Linux and 14 more 2023-12-10 2.1 LOW N/A
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.
CVE-2002-0002 4 Engardelinux, Mandrakesoft, Redhat and 1 more 4 Secure Linux, Mandrake Linux, Linux and 1 more 2023-12-10 7.5 HIGH N/A
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
CVE-2001-0736 5 Engardelinux, Immunix, Mandrakesoft and 2 more 6 Secure Linux, Immunix, Mandrake Linux and 3 more 2023-12-10 2.1 LOW N/A
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
CVE-2001-0739 1 Engardelinux 1 Secure Linux 2023-12-10 7.2 HIGH N/A
Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.
CVE-2001-1240 1 Engardelinux 1 Secure Linux 2023-12-10 10.0 HIGH N/A
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
CVE-2003-0962 4 Andrew Tridgell, Engardelinux, Redhat and 1 more 5 Rsync, Secure Community, Secure Linux and 2 more 2023-12-10 7.5 HIGH N/A
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.