Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slocate slocate vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0848
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
Slocate Slocate 2.1
Slocate Slocate 2.4
Slocate Slocate 2.5
Slocate Slocate 2.6
Slocate Slocate 2.2
Slocate Slocate 2.3
1 EDB exploit
NA
CVE-2005-2499
slocate prior to 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.
Slocate Slocate 2.3
Slocate Slocate 2.4
Slocate Slocate 2.5
Slocate Slocate 2.1
Slocate Slocate 2.2
Slocate Slocate 2.6
NA
CVE-2003-0056
Buffer overflow in secure locate (slocate) prior to 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.
Slocate Slocate 2.5
Slocate Slocate 2.6
1 EDB exploit
NA
CVE-2003-0326
Integer overflow in parse_decode_path() of slocate may allow malicious users to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
Slocate Slocate
NA
CVE-2007-0227
slocate 3.1 does not properly manage database entries that specify names of files in protected directories, which allows local users to obtain the names of private files. NOTE: another researcher reports that the issue is not present in slocate 2.7.
Slocate Slocate 3.1
NA
CVE-2000-0602
Secure Locate (slocate) in Red Hat Linux allows local users to gain privileges via a malformed configuration file that is specified in the LOCATE_PATH environmental variable.
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
NA
CVE-2001-0066
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
Kevin Lindsay Secure Locate 1.4
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
Kevin Lindsay Secure Locate 2.2
Kevin Lindsay Secure Locate 1.5
Kevin Lindsay Secure Locate 1.6
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started