Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware linux vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-1999-0421
During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
Slackware Slackware Linux 3.6
725
VMScore
CVE-1999-1489
Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument.
Slackware Slackware Linux 3.1
1 EDB exploit
668
VMScore
CVE-2003-0335
rc.M in Slackware 9.0 calls quotacheck with the -M option, which causes the filesystem to be remounted and possibly reset security-relevant mount flags such as nosuid, nodev, and noexec.
Slackware Slackware Linux 9.0
641
VMScore
CVE-1999-0340
Buffer overflow in Linux Slackware crond program allows local users to gain root access.
Slackware Slackware Linux 3.4
169
VMScore
CVE-2007-0823
xterm on Slackware Linux 10.2 stores information that had been displayed for a different user account using the same xterm process, which might allow local users to bypass file permissions and read other users' files, or obtain other sensitive information, by reading the xte...
Slackware Slackware Linux 10.2
365
VMScore
CVE-1999-1498
Slackware Linux 3.4 pkgtool allows local malicious user to read and write to arbitrary files via a symlink attack on the reply file.
Slackware Slackware Linux 3.4
1 EDB exploit
215
VMScore
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
641
VMScore
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Redhat Linux 2.1
Slackware Slackware Linux 3.0
725
VMScore
CVE-2004-0424
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 up to and including 2.4.25 and 2.6.1 up to and including 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Sgi Propack 3.0
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.6.3
Slackware Slackware Linux 9.1
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.25
Slackware Slackware Linux Current
1 EDB exploit
668
VMScore
CVE-2003-0977
CVS server prior to 1.11.10 may allow malicious users to cause the CVS server to create directories and files in the file system root directory via malformed module requests.
Cvs Cvs 1.10.7
Cvs Cvs 1.10.8
Cvs Cvs 1.11
Cvs Cvs 1.11.6
Cvs Cvs 1.11.4
Cvs Cvs 1.11.5
Cvs Cvs 1.11.1
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.2
Cvs Cvs 1.11.3
Slackware Slackware Linux 8.1
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »