Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 7.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0836
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote malicious users to execute arbitrary commands via certain print jobs, possibly involving fonts.
Mandrakesoft Mandrake Linux 8.0
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 6.2
Redhat Linux 7.1
Redhat Linux 7.2
Hp Secure Os 1.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.2
Redhat Linux 7.0
Redhat Linux 8.0
Mandrakesoft Mandrake Linux 9.0
Redhat Linux 7.3
NA
CVE-2002-0638
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and previous versions, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an ...
Mandrakesoft Mandrake Single Network Firewall 7.2
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux 8.0
Redhat Linux 6.0
Redhat Linux 7.0
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Redhat Linux 6.2
Redhat Linux 7.2
Redhat Linux 7.3
Hp Secure Os 1.0
Mandrakesoft Mandrake Linux 8.2
NA
CVE-2002-0506
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and previous versions may allow malicious users to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
Redhat Linux 6.2
Redhat Linux 7.2
Redhat Linux 7.0
Redhat Linux 7.1
NA
CVE-2002-0169
The default stylesheet for DocBook on Red Hat Linux 6.2 up to and including 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.
Redhat Docbook Utils 0.6.9-2
Redhat Docbook Stylesheets 1.54.13
Redhat Docbook Utils 0.6.13
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2002-0080
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
Samba Rsync
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
Redhat Linux 7.2
NA
CVE-2002-0067
Squid 2.4 STABLE3 and previous versions does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote malicious users to bypass intended access restrictions.
Squid Squid
Redhat Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.1
Redhat Linux 7.2
NA
CVE-2002-0069
Memory leak in SNMP in Squid 2.4 STABLE3 and previous versions allows remote malicious users to cause a denial of service.
Squid Squid
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 7.1
NA
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
NA
CVE-2002-0068
Squid 2.4 STABLE3 and previous versions allows remote malicious users to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
Squid Squid
Redhat Linux 6.2
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 7.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »