Product:

Slackware_linux

(Slackware)
Repositories https://github.com/OpenVPN/openvpn
#Vulnerabilities 55
Date Id Summary Products Score Patch Annotated
2000-11-14 CVE-2000-0844 Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. Openlinux, Openlinux_ebuilder, Openlinux_eserver, Linux, Debian_linux, Aix, Immunix, Mandrake_linux, Linux, Irix, Slackware_linux, Solaris, Sunos, Suse_linux, Secure_linux, Turbolinux N/A
2000-05-22 CVE-2000-0438 Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. Openlinux, Slackware_linux, Suse_linux, Turbolinux N/A
2001-03-12 CVE-2000-0315 traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. Debian_linux, Unix, Netbsd, Linux, Slackware_linux N/A
2001-03-12 CVE-2000-0314 traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. Debian_linux, Unix, Netbsd, Linux, Slackware_linux N/A
1998-04-06 CVE-1999-1498 Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file. Slackware_linux N/A
1997-03-04 CVE-1999-1489 Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument. Slackware_linux N/A
1998-02-02 CVE-1999-1445 Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords. Slackware_linux N/A
1998-07-13 CVE-1999-1434 login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server. Slackware_linux N/A
1999-01-02 CVE-1999-1422 The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users. Slackware_linux N/A
1997-02-03 CVE-1999-1299 rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. Linux, Slackware_linux N/A