Vulnerabilities > Redhat > Fedora > 7

DATE CVE VULNERABILITY TITLE RISK
2014-12-06 CVE-2014-9278 Improper Authentication vulnerability in Openbsd Openssh
The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
network
low complexity
openbsd redhat CWE-287
4.0
2008-04-15 CVE-2008-1796 Denial-Of-Service vulnerability in Comix 3.6.4
Comix 3.6.4 creates temporary directories with predictable names, which allows local users to cause an unspecified denial of service.
local
low complexity
redhat comix
4.9
2008-03-31 CVE-2008-1552 Numeric Errors vulnerability in Silc products
The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow.
network
silc redhat CWE-189
6.8
2008-03-24 CVE-2008-1292 Information Exposure vulnerability in Viewvc 1.0.2/1.0.3
ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
4.3
2008-03-24 CVE-2008-1291 Information Exposure vulnerability in Viewvc 1.0.2/1.0.3
ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder.
4.3
2008-03-24 CVE-2008-1290 Information Exposure vulnerability in Viewvc 1.0.2/1.0.3
ViewVC before 1.0.5 includes "all-forbidden" files within search results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensitive information.
4.3
2008-02-25 CVE-2008-0932 Improper Input Validation vulnerability in the Sword Project Diatheke Front END and Sword
diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.
network
low complexity
debian redhat the-sword-project CWE-20
7.5
2008-02-11 CVE-2008-0668 Numeric Errors vulnerability in Gnome Gnumeric
The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.
network
redhat gnome CWE-189
critical
9.3
2007-10-01 CVE-2007-5159 Permissions, Privileges, and Access Controls vulnerability in Ntfs-3G
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
local
low complexity
redhat ntfs-3g ubuntu CWE-264
4.6
2007-08-30 CVE-2007-4134 Path Traversal vulnerability in Redhat Fedora 7
Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //..
network
redhat CWE-22
6.8