Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware slackware linux vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0421
During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
Slackware Slackware Linux 3.6
7.5
CVSSv2
CVE-2003-0335
rc.M in Slackware 9.0 calls quotacheck with the -M option, which causes the filesystem to be remounted and possibly reset security-relevant mount flags such as nosuid, nodev, and noexec.
Slackware Slackware Linux 9.0
5
CVSSv2
CVE-1999-0856
login in Slackware 7.0 allows remote malicious users to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.
Slackware Slackware Linux 7.0
1.9
CVSSv2
CVE-2007-0823
xterm on Slackware Linux 10.2 stores information that had been displayed for a different user account using the same xterm process, which might allow local users to bypass file permissions and read other users' files, or obtain other sensitive information, by reading the xte...
Slackware Slackware Linux 10.2
2.1
CVSSv2
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Sgi Propack 2.4
Slackware Slackware Linux 9.1
Slackware Slackware Linux
1 EDB exploit
10
CVSSv2
CVE-1999-1299
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
Slackware Slackware Linux 3.1
Redhat Linux 4.0
7.2
CVSSv2
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Redhat Linux 4.1
Slackware Slackware Linux 3.3
7.5
CVSSv2
CVE-2003-0977
CVS server prior to 1.11.10 may allow malicious users to cause the CVS server to create directories and files in the file system root directory via malformed module requests.
Cvs Cvs 1.11.1
Cvs Cvs 1.11
Cvs Cvs 1.11.4
Cvs Cvs 1.11.5
Cvs Cvs 1.10.8
Cvs Cvs 1.11.6
Cvs Cvs 1.11.3
Cvs Cvs 1.11.2
Cvs Cvs 1.10.7
Cvs Cvs 1.11.1 P1
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 9.1
7.2
CVSSv2
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Slackware Slackware Linux 3.0
Redhat Linux 2.1
5
CVSSv2
CVE-2018-7184
ntpd in ntp 4.2.8p4 prior to 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote malicious users to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting ...
Ntp Ntp 4.2.8
Synology Skynas -
Synology Virtual Diskstation Manager -
Synology Router Manager 1.1
Synology Diskstation Manager 6.0
Synology Diskstation Manager 5.2
Synology Diskstation Manager 6.1
Synology Vs960hd Firmware -
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.2
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »