Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-1999-1187
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail.
University Of Washington Pine
Freebsd Freebsd 2.1.0
Slackware Slackware Linux 3.0
3.8
CVSSv2
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux Current
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
3.7
CVSSv2
CVE-1999-0123
Race condition in Linux mailx command allows local users to read user files.
Slackware Slackware Linux 3.0
3.6
CVSSv2
CVE-1999-1498
Slackware Linux 3.4 pkgtool allows local malicious user to read and write to arbitrary files via a symlink attack on the reply file.
Slackware Slackware Linux 3.4
1 EDB exploit
2.1
CVSSv2
CVE-2019-11135
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Opensuse Leap 15.0
Opensuse Leap 15.1
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Slackware Slackware 14.2
Hp Apollo 4200 Firmware
Hp Apollo 2000 Firmware
Hp Proliant Bl460c Firmware
Hp Proliant Dl580 Firmware
Hp Proliant Dl560 Firmware
Hp Proliant Dl380 Firmware
Hp Proliant Dl360 Firmware
Hp Proliant Dl180 Firmware
Hp Proliant Dl160 Firmware
Hp Proliant Dl120 Firmware
Hp Proliant Dl20 Firmware
Hp Proliant Ml350 Firmware
Hp Proliant Ml110 Firmware
Hp Proliant Ml30 Firmware
Hp Proliant Xl450 Firmware
Hp Proliant Xl270d Firmware
Hp Proliant Xl230k Firmware
1 Article
2.1
CVSSv2
CVE-2004-0881
getmail 4.x prior to 4.2.0, and other versions prior to 3.2.5, when run as root, allows local users to write files in arbitrary directories via a symlink attack on subdirectories in the maildir.
Getmail Getmail 4.0.0 B10
Getmail Getmail 4.0.1
Getmail Getmail 4.0.5
Getmail Getmail 4.0.6
Getmail Getmail 4.1.3
Getmail Getmail 4.1.4
Getmail Getmail 2.3.7
Getmail Getmail 4.0.12
Getmail Getmail 4.0.13
Getmail Getmail 4.0.2
Getmail Getmail 4.0.9
Getmail Getmail 4.1
Getmail Getmail 4.0.10
Getmail Getmail 4.0.11
Getmail Getmail 4.0.7
Getmail Getmail 4.0.8
Getmail Getmail 4.1.5
Getmail Getmail 3.x
Getmail Getmail 4.0
Getmail Getmail 4.0.3
Getmail Getmail 4.0.4
Getmail Getmail 4.1.1
2.1
CVSSv2
CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Conectiva Linux 10
Redhat Enterprise Linux 2.1
Suse Suse Linux 8.2
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 10.0
Mandrakesoft Mandrake Linux 9.1
Redhat Enterprise Linux 3.0
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 8.0
Suse Suse Linux 8.1
Gentoo Linux
Linux Linux Kernel 2.0
Suse Suse Linux 9.1
Trustix Secure Linux 2
1 EDB exploit
2.1
CVSSv2
CVE-2004-0231
Multiple vulnerabilities in Midnight Commander (mc) prior to 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
Midnight Commander Midnight Commander 4.5.45
Midnight Commander Midnight Commander 4.5.46
Midnight Commander Midnight Commander 4.6
Sgi Propack 2.3
Midnight Commander Midnight Commander 4.5.41
Midnight Commander Midnight Commander 4.5.42
Midnight Commander Midnight Commander 4.5.49
Midnight Commander Midnight Commander 4.5.50
Midnight Commander Midnight Commander 4.5.51
Midnight Commander Midnight Commander 4.5.43
Midnight Commander Midnight Commander 4.5.44
Midnight Commander Midnight Commander 4.5.52
Midnight Commander Midnight Commander 4.5.55
Midnight Commander Midnight Commander 4.5.40
Midnight Commander Midnight Commander 4.5.47
Midnight Commander Midnight Commander 4.5.48
Sgi Propack 2.4
Gentoo Linux 1.4
Gentoo Linux 0.5
Gentoo Linux 0.7
Slackware Slackware Linux
Slackware Slackware Linux 9.0
2.1
CVSSv2
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
1.9
CVSSv2
CVE-2007-0823
xterm on Slackware Linux 10.2 stores information that had been displayed for a different user account using the same xterm process, which might allow local users to bypass file permissions and read other users' files, or obtain other sensitive information, by reading the xte...
Slackware Slackware Linux 10.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »