Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware linux vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Debian Debian Linux 2.1
Debian Debian Linux 2.2
Slackware Slackware Linux
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
7.2
CVSSv2
CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.5
Suse Suse Linux 4.3
Suse Suse Linux 4.4.1
Suse Suse Linux 6.2
Suse Suse Linux 6.4
Suse Suse Linux 5.1
Suse Suse Linux 5.2
Suse Suse Linux 5.3
Suse Suse Linux 6.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Suse Suse Linux 4.2
Turbolinux Turbolinux 6.0
Turbolinux Turbolinux 6.0.1
Turbolinux Turbolinux 6.0.2
Caldera Openlinux 7.0
Slackware Slackware Linux 3.4
Suse Suse Linux 4.4
Suse Suse Linux 5.0
Suse Suse Linux 6.1
3 EDB exploits
7.2
CVSSv2
CVE-1999-0421
During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
Slackware Slackware Linux 3.6
7.2
CVSSv2
CVE-1999-1422
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Slackware Slackware Linux 2.0.35
Slackware Slackware Linux 3.4
7.2
CVSSv2
CVE-1999-1434
login in Slackware Linux 3.2 up to and including 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.4
Slackware Slackware Linux 3.1
Slackware Slackware Linux 3.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
7.2
CVSSv2
CVE-1999-0340
Buffer overflow in Linux Slackware crond program allows local users to gain root access.
Slackware Slackware Linux 3.4
7.2
CVSSv2
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Slackware Slackware Linux 3.3
Redhat Linux 4.1
7.2
CVSSv2
CVE-1999-1489
Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument.
Slackware Slackware Linux 3.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Redhat Linux 2.1
Slackware Slackware Linux 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »