Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
slocate slocate 2.1 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2003-0848
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
Slocate Slocate 2.1
Slocate Slocate 2.4
Slocate Slocate 2.5
Slocate Slocate 2.6
Slocate Slocate 2.2
Slocate Slocate 2.3
1 EDB exploit
2.1
CVSSv2
CVE-2005-2499
slocate prior to 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.
Slocate Slocate 2.3
Slocate Slocate 2.4
Slocate Slocate 2.5
Slocate Slocate 2.1
Slocate Slocate 2.2
Slocate Slocate 2.6
4.6
CVSSv2
CVE-2000-0602
Secure Locate (slocate) in Red Hat Linux allows local users to gain privileges via a malformed configuration file that is specified in the LOCATE_PATH environmental variable.
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
7.2
CVSSv2
CVE-2001-0066
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
Kevin Lindsay Secure Locate 1.4
Kevin Lindsay Secure Locate 2.0
Kevin Lindsay Secure Locate 2.1
Kevin Lindsay Secure Locate 2.2
Kevin Lindsay Secure Locate 1.5
Kevin Lindsay Secure Locate 1.6
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started