📦 Linux Pam
by Linux Pam
🔍 What is Linux Pam?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This Linux-PAM vulnerability allows authentication bypass for non-existent users with empty passwords, effectively granting root access. It affects Linux systems using PAM for authentication with vers...
This CVE describes a speculative execution vulnerability in PAM (Pluggable Authentication Modules) where an attacker can manipulate branch prediction to speculatively execute ROP chains, potentially l...