Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0421
During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
Slackware Slackware Linux 3.6
NA
CVE-1999-0368
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Washington University Wu-ftpd 2.4.2 Beta18 Vr9
Proftpd Project Proftpd 1.2 Pre1
Washington University Wu-ftpd 2.4.2 Beta18
Sco Openserver 5.0
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.4
Redhat Linux 5.0
Sco Openserver 5.0.2
Sco Openserver 5.0.5
Slackware Slackware Linux 3.6
Sco Unixware 7.0
Debian Debian Linux 2.0
Sco Openserver 5.0.3
Sco Unixware 7.0.1
Sco Openserver 5.0.4
Caldera Openlinux 1.3
2 EDB exploits
NA
CVE-1999-1422
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
Slackware Slackware Linux 2.0.35
Slackware Slackware Linux 3.4
NA
CVE-1999-1434
login in Slackware Linux 3.2 up to and including 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.4
Slackware Slackware Linux 3.1
Slackware Slackware Linux 3.2
1 EDB exploit
NA
CVE-1999-1498
Slackware Linux 3.4 pkgtool allows local malicious user to read and write to arbitrary files via a symlink attack on the reply file.
Slackware Slackware Linux 3.4
1 EDB exploit
NA
CVE-1999-1445
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote malicious users to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
Slackware Slackware Linux 3.3
Slackware Slackware Linux 3.4
NA
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
NA
CVE-1999-0340
Buffer overflow in Linux Slackware crond program allows local users to gain root access.
Slackware Slackware Linux 3.4
NA
CVE-1999-0192
Buffer overflow in telnet daemon tgetent routing allows remote malicious users to gain root access via the TERMCAP environmental variable.
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.2
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Redhat Linux 6.0
Redhat Linux 5.0
Slackware Slackware Linux 3.9
Slackware Slackware Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.0
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Redhat Linux 4.2
2 EDB exploits
NA
CVE-1999-1095
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.
Slackware Slackware Linux 3.3
Redhat Linux 4.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »