Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware slackware linux 3.3 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2013-7171
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote malicious users to execute arbitrary code with root privileges.
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
NA
CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Suse Suse Linux 6.2
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.4
Caldera Openlinux 7.0
Slackware Slackware Linux 3.9
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Turbolinux Turbolinux 6.0.1
Turbolinux Turbolinux 6.0
Turbolinux Turbolinux 6.0.2
Suse Suse Linux 6.1
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Suse Suse Linux 7.0
Slackware Slackware Linux 3.6
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Slackware Slackware Linux 3.3
3 EDB exploits
NA
CVE-1999-0433
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Xfree86 Project X11r6 3.3.3
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Netbsd Netbsd 1.3.3
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Netbsd Netbsd 1.3.2
1 EDB exploit
NA
CVE-1999-1434
login in Slackware Linux 3.2 up to and including 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.2
Slackware Slackware Linux 3.4
Slackware Slackware Linux 3.1
Slackware Slackware Linux 3.3
1 EDB exploit
NA
CVE-1999-1445
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote malicious users to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
Slackware Slackware Linux 3.4
Slackware Slackware Linux 3.3
NA
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
NA
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Redhat Linux 4.1
Slackware Slackware Linux 3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started