Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-1434
login in Slackware Linux 3.2 up to and including 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.4
Slackware Slackware Linux 3.1
Slackware Slackware Linux 3.2
1 EDB exploit
7.8
CVSSv3
CVE-2018-9336
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x prior to 2.4.6 allows a local malicious user to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibl...
Openvpn Openvpn
Slackware Slackware Linux 14.1
Slackware Slackware Linux 13.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.0
Slackware Slackware Linux 13.37
7.8
CVSSv3
CVE-2013-7172
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
Slackware Slackware Linux 13.1
Slackware Slackware Linux 13.37
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
NA
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
NA
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
NA
CVE-1999-1445
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote malicious users to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.4
NA
CVE-2003-0195
CUPS prior to 1.1.19 allows remote malicious users to cause a denial of service via a partial printing request to the IPP port (631), which does not time out.
Slackware Slackware Linux 8.1
Slackware Slackware Linux 9.0
1 EDB exploit
9.8
CVSSv3
CVE-2013-7171
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote malicious users to execute arbitrary code with root privileges.
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
NA
CVE-1999-1422
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Slackware Slackware Linux 2.0.35
Slackware Slackware Linux 3.4
NA
CVE-1999-0298
ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote malicious users to overwrite files via a .. (dot dot) attack.
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.3
Sun Sunos 4.1.4
Slackware Slackware Linux 2.2
Sun Sunos 4.1.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »