Slackware Linux 7.0

CPE Details

Slackware Linux 7.0
7.0
2007-08-23
19h16 +00:00
2011-11-08
17h21 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*

Informations

Vendor

slackware

Product

slackware_linux

Version

7.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2004-0226 2004-05-05 02h00 +00:00 Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
10
CVE-2004-0231 2004-05-05 02h00 +00:00 Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
2.1
CVE-2004-0232 2004-05-05 02h00 +00:00 Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
5
CVE-2004-0233 2004-05-05 02h00 +00:00 Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
2.1
CVE-2002-0004 2002-06-25 02h00 +00:00 Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
7.2
CVE-2000-0844 2001-01-22 04h00 +00:00 Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
10
CVE-2000-0867 2001-01-22 04h00 +00:00 Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
7.2
CVE-1999-0856 2000-06-02 02h00 +00:00 login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.
5
CVE-1999-0242 2000-02-04 04h00 +00:00 Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.
7.5