Filtered by vendor Slackware
Subscribe
Total
58 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-1999-1498 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 3.6 LOW | N/A |
Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file. | |||||
CVE-1999-1489 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument. | |||||
CVE-1999-1445 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 5.0 MEDIUM | N/A |
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords. | |||||
CVE-1999-1434 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server. | |||||
CVE-1999-1422 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users. | |||||
CVE-1999-1299 | 2 Redhat, Slackware | 2 Linux, Slackware Linux | 2024-11-20 | 10.0 HIGH | N/A |
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. | |||||
CVE-1999-1187 | 3 Freebsd, Slackware, University Of Washington | 3 Freebsd, Slackware Linux, Pine | 2024-11-20 | 4.6 MEDIUM | N/A |
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. | |||||
CVE-1999-1186 | 3 Redhat, Rxvt, Slackware | 3 Linux, Rxvt, Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. | |||||
CVE-1999-1095 | 2 Redhat, Slackware | 2 Linux, Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort. | |||||
CVE-1999-0856 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 5.0 MEDIUM | N/A |
login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist. | |||||
CVE-1999-0746 | 2 Slackware, Suse | 2 Slackware Linux, Suse Linux | 2024-11-20 | 5.0 MEDIUM | N/A |
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service. | |||||
CVE-1999-0433 | 5 Netbsd, Redhat, Slackware and 2 more | 5 Netbsd, Linux, Slackware Linux and 2 more | 2024-11-20 | 4.6 MEDIUM | N/A |
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | |||||
CVE-1999-0421 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password. | |||||
CVE-1999-0368 | 7 Caldera, Debian, Proftpd Project and 4 more | 8 Openlinux, Debian Linux, Proftpd and 5 more | 2024-11-20 | 10.0 HIGH | N/A |
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto. | |||||
CVE-1999-0341 | 2 Debian, Slackware | 2 Debian Linux, Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access. | |||||
CVE-1999-0340 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.2 HIGH | N/A |
Buffer overflow in Linux Slackware crond program allows local users to gain root access. | |||||
CVE-1999-0298 | 2 Slackware, Sun | 2 Slackware Linux, Sunos | 2024-11-20 | 7.5 HIGH | N/A |
ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack. | |||||
CVE-1999-0242 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 7.5 HIGH | N/A |
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. | |||||
CVE-1999-0192 | 2 Redhat, Slackware | 2 Linux, Slackware Linux | 2024-11-20 | 10.0 HIGH | N/A |
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable. | |||||
CVE-1999-0123 | 1 Slackware | 1 Slackware Linux | 2024-11-20 | 3.7 LOW | N/A |
Race condition in Linux mailx command allows local users to read user files. |