Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Slackware_linux
(Slackware)Repositories | https://github.com/OpenVPN/openvpn |
#Vulnerabilities | 55 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2000-05-22 | CVE-2000-0438 | Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. | Openlinux, Slackware_linux, Suse_linux, Turbolinux | N/A | ||
2001-03-12 | CVE-2000-0315 | traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. | Debian_linux, Unix, Netbsd, Linux, Slackware_linux | N/A | ||
2001-03-12 | CVE-2000-0314 | traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. | Debian_linux, Unix, Netbsd, Linux, Slackware_linux | N/A | ||
1998-04-06 | CVE-1999-1498 | Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file. | Slackware_linux | N/A | ||
1997-03-04 | CVE-1999-1489 | Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument. | Slackware_linux | N/A | ||
1998-02-02 | CVE-1999-1445 | Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords. | Slackware_linux | N/A | ||
1998-07-13 | CVE-1999-1434 | login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server. | Slackware_linux | N/A | ||
1999-01-02 | CVE-1999-1422 | The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users. | Slackware_linux | N/A | ||
1997-02-03 | CVE-1999-1299 | rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. | Linux, Slackware_linux | N/A | ||
1996-08-26 | CVE-1999-1187 | Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. | Freebsd, Slackware_linux, Pine | N/A |