cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-2365,https://securityvulnerability.io/vulnerability/CVE-2008-2365,,"Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to ""late ptrace_may_attach() check"" and ""race around &dead_engine_ops setting,"" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.",Linux,"Linux Kernel,Enterprise Linux Desktop,Enterprise Linux",,,0.0004199999966658652,false,false,false,false,,false,false,2008-06-30T21:00:00.000Z,0 CVE-2005-0001,https://securityvulnerability.io/vulnerability/CVE-2005-0001,,"Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.",Linux,"Linux Kernel,Enterprise Linux,Enterprise Linux Desktop,Secure Linux",,,0.0006500000017695129,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2004-0812,https://securityvulnerability.io/vulnerability/CVE-2004-0812,,"Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with ""setting up TSS limits,"" allows local users to cause a denial of service (crash) and possibly execute arbitrary code.",Linux,"Linux Kernel,Enterprise Linux Desktop,Enterprise Linux",,,0.0004199999966658652,false,false,false,false,,false,false,2005-04-14T04:00:00.000Z,0 CVE-2005-0003,https://securityvulnerability.io/vulnerability/CVE-2005-0003,,"The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.",Linux,"Linux Kernel,Mandrake Linux Corporate Server,Enterprise Linux Desktop,Enterprise Linux,Mandrake Linux,Modular Messaging Message Storage Server,S8710,Converged Communications Server,Mn100,Network Routing",,,0.0006200000061653554,false,false,false,false,,false,false,2005-04-14T04:00:00.000Z,0 CVE-2004-1068,https://securityvulnerability.io/vulnerability/CVE-2004-1068,,"A ""missing serialization"" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.",Linux,"Linux Kernel,Enterprise Linux,Enterprise Linux Desktop,Ubuntu Linux,Linux Advanced Workstation",,,0.0006300000241026282,false,false,false,false,,false,false,2005-01-10T05:00:00.000Z,0 CVE-2004-0685,https://securityvulnerability.io/vulnerability/CVE-2004-0685,,"Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.",Linux,"Linux Kernel,Secure Linux,Enterprise Linux Desktop,Enterprise Linux",,,0.001769999973475933,false,false,false,false,,false,false,2004-12-23T05:00:00.000Z,0