Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mandrake_linux_corporate_server
(Mandrakesoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 55 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-12-06 | CVE-2004-0565 | Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. | Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Secure_linux | N/A | ||
2004-10-20 | CVE-2004-0559 | The maketemp.pl script in Usermin 1.070 and 1.080 allows local users to overwrite arbitrary files at install time via a symlink attack on the /tmp/.usermin directory. | Mandrake_linux, Mandrake_linux_corporate_server, Usermin, Webmin | N/A | ||
2004-08-06 | CVE-2004-0535 | The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. | Linux, Secure_community, Secure_linux, Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Suse_email_server, Suse_linux, Suse_linux_admin\-Cd_for_firewall, Suse_linux_connectivity_server, Suse_linux_database_server, Suse_linux_firewall_cd, Suse_linux_firewall_live\-Cd, Suse_linux_office_server, Suse_office_server | N/A | ||
2004-12-06 | CVE-2004-0497 | Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4. | Linux, Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Enterprise_linux, Suse_linux, Secure_linux | N/A | ||
2004-12-06 | CVE-2004-0496 | Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool. | Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Solaris, Sunos, Suse_email_server, Suse_linux, Suse_linux_connectivity_server, Suse_linux_database_server, Suse_linux_firewall, Suse_linux_office_server | N/A | ||
2003-08-27 | CVE-2003-0462 | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall | N/A | ||
2003-07-24 | CVE-2003-0434 | Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink. | Acrobat, Mandrake_linux, Mandrake_linux_corporate_server, Enterprise_linux, Linux, Linux_advanced_workstation, Xpdf | N/A | ||
2002-08-12 | CVE-2002-0638 | setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh. | Secure_os, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_single_network_firewall, Linux | N/A | ||
2001-11-28 | CVE-2001-1449 | The default installation of Apache before 1.3.19 on Mandrake Linux 7.1 through 8.0 and Linux Corporate Server 1.0.1 allows remote attackers to list the directory index of arbitrary web directories. | Http_server, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_single_network_firewall | N/A | ||
2001-07-18 | CVE-2001-1030 | Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | Openlinux_server, Immunix, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_single_network_firewall, Linux, Squid_web_proxy, Secure_linux | N/A |