cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-1673,https://securityvulnerability.io/vulnerability/CVE-2008-1673,,"The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.",Linux,"Linux Kernel,Debian Linux",,,0.1255899965763092,false,false,false,false,,false,false,2008-06-10T00:00:00.000Z,0 CVE-2008-2137,https://securityvulnerability.io/vulnerability/CVE-2008-2137,,"The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.",Linux,"Linux Kernel,Debian Linux",,,0.0004199999966658652,false,false,false,false,,false,false,2008-05-29T16:00:00.000Z,0 CVE-2000-0289,https://securityvulnerability.io/vulnerability/CVE-2000-0289,,IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.,Linux,"Linux Kernel,Linux,Debian Linux",,,0.0056500001810491085,false,false,false,false,,false,false,2000-03-27T05:00:00.000Z,0