Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware slackware linux 9.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
6.8
CVSSv2
CVE-2007-3798
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and previous versions allows remote malicious users to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
Tcpdump Tcpdump
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Slackware Slackware 9.0
Slackware Slackware 9.1
Slackware Slackware 10.0
Slackware Slackware 10.1
Slackware Slackware 10.2
Slackware Slackware 11.0
Slackware Slackware 12.0
Freebsd Freebsd 6.2
Freebsd Freebsd
Freebsd Freebsd 6.1
Freebsd Freebsd 5.5
Apple Mac Os X Server
Apple Mac Os X
1 EDB exploit
6.9
CVSSv2
CVE-2004-0940
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Apache Http Server
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 10.0
Hp Hp-ux 11.11
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Slackware Slackware Linux 8.0
Suse Suse Linux 8.2
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Hp Hp-ux 11.00
Hp Hp-ux 11.22
Suse Suse Linux 9.1
Hp Hp-ux 11.20
Suse Suse Linux 8.1
2 EDB exploits
7.5
CVSSv2
CVE-2003-0977
CVS server prior to 1.11.10 may allow malicious users to cause the CVS server to create directories and files in the file system root directory via malformed module requests.
Cvs Cvs 1.10.7
Cvs Cvs 1.10.8
Cvs Cvs 1.11
Cvs Cvs 1.11.6
Cvs Cvs 1.11.4
Cvs Cvs 1.11.5
Cvs Cvs 1.11.1
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.2
Cvs Cvs 1.11.3
Slackware Slackware Linux 8.1
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
7.2
CVSSv2
CVE-2004-0424
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 up to and including 2.4.25 and 2.6.1 up to and including 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Sgi Propack 3.0
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.6.3
Slackware Slackware Linux 9.1
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.25
Slackware Slackware Linux Current
1 EDB exploit
3.8
CVSSv2
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux Current
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
1.2
CVSSv2
CVE-2004-0880
getmail 4.x prior to 4.2.0, when run as root, allows local users to overwrite arbitrary files via a symlink attack on an mbox file.
Getmail Getmail 3.x
Getmail Getmail 4.0
Getmail Getmail 4.0.2
Getmail Getmail 4.0.3
Getmail Getmail 2.3.7
Getmail Getmail 4.0.12
Getmail Getmail 4.0.13
Getmail Getmail 4.0.9
Getmail Getmail 4.1
Getmail Getmail 4.0.0 B10
Getmail Getmail 4.0.1
Getmail Getmail 4.0.4
Getmail Getmail 4.0.5
Getmail Getmail 4.1.3
Getmail Getmail 4.1.4
Getmail Getmail 4.1.1
Getmail Getmail 4.1.2
Getmail Getmail 4.0.10
Getmail Getmail 4.0.11
Getmail Getmail 4.0.6
Getmail Getmail 4.0.7
Getmail Getmail 4.0.8
2.1
CVSSv2
CVE-2004-0881
getmail 4.x prior to 4.2.0, and other versions prior to 3.2.5, when run as root, allows local users to write files in arbitrary directories via a symlink attack on subdirectories in the maildir.
Getmail Getmail 4.0.0 B10
Getmail Getmail 4.0.1
Getmail Getmail 4.0.5
Getmail Getmail 4.0.6
Getmail Getmail 4.1.3
Getmail Getmail 4.1.4
Getmail Getmail 2.3.7
Getmail Getmail 4.0.12
Getmail Getmail 4.0.13
Getmail Getmail 4.0.2
Getmail Getmail 4.0.9
Getmail Getmail 4.1
Getmail Getmail 4.0.10
Getmail Getmail 4.0.11
Getmail Getmail 4.0.7
Getmail Getmail 4.0.8
Getmail Getmail 4.1.5
Getmail Getmail 3.x
Getmail Getmail 4.0
Getmail Getmail 4.0.3
Getmail Getmail 4.0.4
Getmail Getmail 4.1.1
7.8
CVSSv2
CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x prior to 9.8.5-P2, 9.8.6b1, 9.9.x prior to 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 prior to 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote malicious users to cause a denial of service (assertion failure and name...
Isc Bind 9.7.0
Isc Bind 9.7.1
Isc Bind 9.7.2
Isc Bind 9.7.3
Isc Bind 9.7.5
Isc Bind 9.7.6
Isc Bind 9.7.4
Isc Bind 9.7.7
Suse Suse Linux Enterprise Software Development Kit 11.0
Novell Suse Linux 11
Isc Dnsco Bind 9.9.3
Isc Dnsco Bind 9.9.4
Opensuse Opensuse 11.4
Isc Bind 9.9.3
Isc Bind 9.9.0
Isc Bind 9.9.1
Isc Bind 9.9.2
Freebsd Freebsd 9.1
Freebsd Freebsd 8.3
Freebsd Freebsd 8.4
Freebsd Freebsd 9.2
Freebsd Freebsd 8.0
7.5
CVSSv2
CVE-2003-0962
Heap-based buffer overflow in rsync prior to 2.5.7, when running in server mode, allows remote malicious users to execute arbitrary code and possibly escape the chroot jail.
Andrew Tridgell Rsync 2.4.4
Andrew Tridgell Rsync 2.4.5
Andrew Tridgell Rsync 2.5.5
Andrew Tridgell Rsync 2.5.6
Engardelinux Secure Community 1.0.1
Engardelinux Secure Community 2.0
Andrew Tridgell Rsync 2.4.1
Andrew Tridgell Rsync 2.4.3
Andrew Tridgell Rsync 2.5.2
Andrew Tridgell Rsync 2.5.3
Andrew Tridgell Rsync 2.5.4
Redhat Rsync 2.5.5-1
Redhat Rsync 2.5.5-4
Andrew Tridgell Rsync 2.3.1
Andrew Tridgell Rsync 2.4.6
Andrew Tridgell Rsync 2.4.8
Redhat Rsync 2.4.6-2
Redhat Rsync 2.4.6-5
Engardelinux Secure Linux 1.1
Engardelinux Secure Linux 1.2
Andrew Tridgell Rsync 2.3.2
Andrew Tridgell Rsync 2.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »