Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slackware vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2013-7171
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote malicious users to execute arbitrary code with root privileges.
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
7.8
CVSSv3
CVE-2013-7172
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
Slackware Slackware Linux 13.1
Slackware Slackware Linux 13.37
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
6.5
CVSSv3
CVE-2019-11135
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Opensuse Leap 15.0
Opensuse Leap 15.1
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Slackware Slackware 14.2
Hp Apollo 4200 Firmware
Hp Apollo 2000 Firmware
Hp Proliant Bl460c Firmware
Hp Proliant Dl580 Firmware
Hp Proliant Dl560 Firmware
Hp Proliant Dl380 Firmware
Hp Proliant Dl360 Firmware
Hp Proliant Dl180 Firmware
Hp Proliant Dl160 Firmware
Hp Proliant Dl120 Firmware
Hp Proliant Dl20 Firmware
Hp Proliant Ml350 Firmware
Hp Proliant Ml110 Firmware
Hp Proliant Ml30 Firmware
Hp Proliant Xl450 Firmware
Hp Proliant Xl270d Firmware
Hp Proliant Xl230k Firmware
1 Article
7.8
CVSSv3
CVE-2018-9336
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x prior to 2.4.6 allows a local malicious user to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibl...
Openvpn Openvpn
Slackware Slackware Linux 14.1
Slackware Slackware Linux 13.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.0
Slackware Slackware Linux 13.37
7.5
CVSSv3
CVE-2018-7184
ntpd in ntp 4.2.8p4 prior to 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote malicious users to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting ...
Ntp Ntp 4.2.8
Synology Skynas -
Synology Router Manager 1.1
Synology Diskstation Manager 6.1
Synology Diskstation Manager 6.0
Synology Virtual Diskstation Manager -
Synology Diskstation Manager 5.2
Synology Vs960hd Firmware -
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.2
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Netapp Steelstore Cloud Integrated Storage -
Netapp Cloud Backup -
NA
CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x prior to 9.8.5-P2, 9.8.6b1, 9.9.x prior to 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 prior to 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote malicious users to cause a denial of service (assertion failure and name...
Isc Bind 9.7.0
Isc Bind 9.7.1
Isc Bind 9.7.2
Isc Bind 9.7.3
Isc Bind 9.7.5
Isc Bind 9.7.6
Isc Bind 9.7.4
Isc Bind 9.7.7
Suse Suse Linux Enterprise Software Development Kit 11.0
Novell Suse Linux 11
Isc Dnsco Bind 9.9.3
Isc Dnsco Bind 9.9.4
Opensuse Opensuse 11.4
Isc Bind 9.9.3
Isc Bind 9.9.0
Isc Bind 9.9.1
Isc Bind 9.9.2
Freebsd Freebsd 9.1
Freebsd Freebsd 8.3
Freebsd Freebsd 8.4
Freebsd Freebsd 9.2
Freebsd Freebsd 8.0
NA
CVE-2009-1894
Race condition in PulseAudio 0.9.9, 0.9.10, and 0.9.14 allows local users to gain privileges via vectors involving creation of a hard link, related to the application setting LD_BIND_NOW to 1, and then calling execv on the target of the /proc/self/exe symlink.
Pulseaudio Pulseaudio 0.9.10
Pulseaudio Pulseaudio 0.9.9
Pulseaudio Pulseaudio 0.9.14
2 EDB exploits
9.8
CVSSv3
CVE-2007-3798
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and previous versions allows remote malicious users to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
Tcpdump Tcpdump
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Slackware Slackware 9.0
Slackware Slackware 9.1
Slackware Slackware 10.0
Slackware Slackware 10.1
Slackware Slackware 10.2
Slackware Slackware 11.0
Slackware Slackware 12.0
Freebsd Freebsd 6.2
Freebsd Freebsd
Freebsd Freebsd 6.1
Freebsd Freebsd 5.5
Apple Mac Os X Server
Apple Mac Os X
1 EDB exploit
NA
CVE-2007-3499
SlackRoll prior to 8 accepts gpg exit codes other than 0 and 1 as evidence of a valid signature, which allows remote Slackware mirror sites or man-in-the-middle malicious users to cause a denial of service (data inconsistency) or possibly install Trojan horse packages via malform...
Slackroll Slackroll 7
NA
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux Current
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »