Engarde Secure Linux 1.0.1

CPE Details

Engarde Secure Linux 1.0.1
1.0.1
2007-08-23
19h16 +00:00
2008-03-25
18h15 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*

Informations

Vendor

engardelinux

Product

secure_linux

Version

1.0.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2001-1240 2002-06-25 02h00 +00:00 The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
10
CVE-2002-0002 2002-06-25 02h00 +00:00 Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
7.5
CVE-2002-0083 2002-06-25 02h00 +00:00 Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
9.8
Critical
CVE-2001-0739 2002-03-09 04h00 +00:00 Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.
7.2
CVE-2001-0736 2001-10-12 02h00 +00:00 Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
2.1