Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 7.2 vulnerabilities and exploits
(subscribe to this query)
3.6
CVSSv2
CVE-2002-1509
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
7.2
CVSSv2
CVE-2016-0758
Integer overflow in lib/asn1_decoder.c in the Linux kernel prior to 4.6 allows local users to gain privileges via crafted ASN.1 data.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.2
Redhat Enterprise Linux Hpc Node Eus 7.2
Linux Linux Kernel
Canonical Ubuntu Linux 16.04
7.2
CVSSv2
CVE-2002-0506
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and previous versions may allow malicious users to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 7.1
Redhat Linux 7.0
7.2
CVSSv2
CVE-2002-1160
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses s...
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
5
CVSSv2
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
2.1
CVSSv2
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
7.5
CVSSv2
CVE-2003-0354
Unknown vulnerability in GNU Ghostscript prior to 7.07 allows malicious users to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
4.6
CVSSv2
CVE-2003-0464
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
5
CVSSv2
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
10
CVSSv2
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »