Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kevin lindsay secure locate 2.0 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2001-0066
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
Kevin Lindsay Secure Locate 1.4
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
Kevin Lindsay Secure Locate 2.2
Kevin Lindsay Secure Locate 1.5
Kevin Lindsay Secure Locate 1.6
1 EDB exploit
4.6
CVSSv2
CVE-2000-0602
Secure Locate (slocate) in Red Hat Linux allows local users to gain privileges via a malformed configuration file that is specified in the LOCATE_PATH environmental variable.
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started