Vulnerabilities
Vulnerable Software
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
CVSS Score
7.2
EPSS Score
0.003
Published
2000-05-22
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
CVSS Score
4.6
EPSS Score
0.002
Published
1999-03-21
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
CVSS Score
10.0
EPSS Score
0.483
Published
1999-02-09
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-01-02
login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-07-13
Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file.
CVSS Score
3.6
EPSS Score
0.001
Published
1998-04-06
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
CVSS Score
5.0
EPSS Score
0.008
Published
1998-02-02
Buffer overflow in Linux Slackware crond program allows local users to gain root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-12-01
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
CVSS Score
10.0
EPSS Score
0.067
Published
1997-10-18


Contact Us

Shodan ® - All rights reserved