Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-1999-1422
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Slackware Slackware Linux 3.4
Slackware Slackware Linux 2.0.35
641
VMScore
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
641
VMScore
CVE-1999-0340
Buffer overflow in Linux Slackware crond program allows local users to gain root access.
Slackware Slackware Linux 3.4
641
VMScore
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Redhat Linux 4.1
Slackware Slackware Linux 3.3
641
VMScore
CVE-1999-1186
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.
Rxvt Rxvt
Slackware Slackware Linux 3.0
Redhat Linux 2.1
570
VMScore
CVE-2007-3499
SlackRoll prior to 8 accepts gpg exit codes other than 0 and 1 as evidence of a valid signature, which allows remote Slackware mirror sites or man-in-the-middle malicious users to cause a denial of service (data inconsistency) or possibly install Trojan horse packages via malform...
Slackroll Slackroll 7
505
VMScore
CVE-2003-0195
CUPS prior to 1.1.19 allows remote malicious users to cause a denial of service via a partial printing request to the IPP port (631), which does not time out.
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
1 EDB exploit
505
VMScore
CVE-1999-0746
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote malicious user to conduct a denial of service.
Suse Suse Linux 6.2
Slackware Slackware Linux 3.2
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Suse Suse Linux 5.3
1 EDB exploit
475
VMScore
CVE-2002-1814
Buffer overflow in efstools in Bonobo, when installed setuid, allows local users to execute arbitrary code via long command line arguments.
Gnome Bonobo
Redhat Linux 6.2
Slackware Slackware Linux 8.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 9.0
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 8.0
3 EDB exploits
470
VMScore
CVE-2000-0545
Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter.
Sgi Mailx 3
Sgi Mailx 6.1
Sgi Mailx 6.4
Sgi Mailx 5
Sgi Mailx 6.0.1
Sgi Mailx 6.5
Sgi Mailx 4
Sgi Mailx 6.3
Sgi Mailx 6.2
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »