Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 7.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2002-1155
Buffer overflow in KON kon2 0.3.9b and previous versions allows local users to execute arbitrary code via a long -Coding command line argument.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
2 EDB exploits
5
CVSSv2
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
4.6
CVSSv2
CVE-2003-0194
tcpdump does not properly drop privileges to the pcap user when starting up.
Redhat Tcpdump 3.6.3-3
Redhat Tcpdump 3.7.2-1
Redhat Tcpdump 3.4-39
Redhat Tcpdump 3.6.2-9
Redhat Tcpdump 3.6.2-12
Redhat Linux 7.1
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 8.0
7.2
CVSSv2
CVE-2003-0188
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
Lv Lv 4.49.3
Lv Lv 4.49.4
Redhat Lv 4.49.4-9
Lv Lv 4.49.1
Lv Lv 4.49.2
Redhat Lv 4.49.4-1
Redhat Lv 4.49.4-3
Redhat Lv 4.49.4-7
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
3.6
CVSSv2
CVE-2002-1509
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
7.2
CVSSv2
CVE-2002-1160
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses s...
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 8.0
10
CVSSv2
CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Mit Kerberos Ftp Client
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
4.9
CVSSv2
CVE-2002-2185
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively di...
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.18m
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
4.6
CVSSv2
CVE-2002-1323
Safe.pm 2.0.7 and previous versions, when used in Perl 5.8.0 and previous versions, may allow malicious users to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Safe.pm Safe.pm 2.0 7
Sun Linux 5.0.7
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.19
Sgi Irix 6.5.19f
Sgi Irix 6.5.22
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Safe.pm Safe.pm 2.0 6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
5
CVSSv2
CVE-2002-1232
Memory leak in ypdb_open in yp_db.c for ypserv prior to 2.5 in the NIS package 3.9 and previous versions allows remote malicious users to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
Debian Debian Linux 2.2
Debian Debian Linux 3.0
Redhat Linux 7.0
Redhat Linux 7.3
Redhat Linux 6.2
Redhat Linux 7.2
Hp Secure Os 1.0
Redhat Linux 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »