Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openlinux
(Caldera)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 36 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1999-04-05 | CVE-1999-0439 | Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. | Openlinux, Procmail | N/A | ||
1999-04-27 | CVE-1999-0712 | A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable. | Coas, Openlinux | N/A | ||
1999-10-01 | CVE-1999-0880 | Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly. | Bsd_os, Openlinux | N/A | ||
1999-10-01 | CVE-1999-0879 | Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file. | Bsd_os, Openlinux | N/A | ||
1999-06-23 | CVE-1999-0731 | The KDE klock program allows local users to unlock a session using malformed input. | Openlinux | N/A | ||
2002-10-28 | CVE-2002-1199 | The getdbm procedure in ypxfrd allows local users to read arbitrary files, and remote attackers to read databases outside /var/yp, via a directory traversal and symlink attack on the domain and map arguments. | Openlinux, Openserver, Solaris, Sunos | N/A | ||
2001-12-06 | CVE-2001-0851 | Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie. | Openlinux, Openlinux_edesktop, Openlinux_eserver, Openlinux_server, Openlinux_workstation, Linux_kernel, Suse_linux | N/A | ||
2001-12-06 | CVE-2001-0850 | A configuration error in the libdb1 package in OpenLinux 3.1 uses insecure versions of the snprintf and vsnprintf functions, which could allow local or remote users to exploit those functions with a buffer overflow. | Openlinux | N/A | ||
2001-01-09 | CVE-2000-1134 | Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. | Openlinux, Openlinux_edesktop, Openlinux_eserver, Linux, Hp\-Ux, Immunix, Mandrake_linux, Linux, Suse_linux | N/A | ||
2000-12-19 | CVE-2000-0917 | Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands. | Openlinux, Openlinux_ebuilder, Openlinux_edesktop, Openlinux_eserver, Linux, Secure_linux | N/A |