Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2001-1028
Buffer overflow in ultimate_source function of man 1.5 and previous versions allows local users to gain privileges.
Redhat Linux 5.0
Redhat Linux 5.2
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.1
4.6
CVSSv2
CVE-2003-0464
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
5
CVSSv2
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 7.3
10
CVSSv2
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
5
CVSSv2
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
2.1
CVSSv2
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
7.5
CVSSv2
CVE-2003-0354
Unknown vulnerability in GNU Ghostscript prior to 7.07 allows malicious users to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
7.2
CVSSv2
CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and previous versions allows local users to execute arbitrary code via a long -Coding command line argument.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
2 EDB exploits
10
CVSSv2
CVE-1999-0002
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Caldera Openlinux 1.2
Redhat Linux 2.1
Bsdi Bsd Os 1.1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 2.0
Redhat Linux 3.0.3
Redhat Linux 5.1
1 EDB exploit
2 Github repositories
3.6
CVSSv2
CVE-2002-0044
GNU Enscript 1.6.1 and previous versions allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
Gnu Enscript
Redhat Linux 6.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
Debian Debian Linux 2.2
Redhat Linux 7.1
Redhat Linux 7.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-21111
CVE-2024-32884
IDOR
CVE-2023-1000
CVE-2024-33260
CVE-2024-3682
reflected XSS
race condition
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »