cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2006-1056,https://securityvulnerability.io/vulnerability/CVE-2006-1056,,"The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.",Linux,"Linux Kernel,FreeBSD",,,0.00107999995816499,false,false,false,false,,false,false,2006-04-20T10:00:00.000Z,0 CVE-2005-4351,https://securityvulnerability.io/vulnerability/CVE-2005-4351,,"The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.",Linux,"Linux Kernel,OpenBSD,Dragonfly,FreeBSD",,,0.0021100000012665987,false,false,false,false,,false,false,2005-12-31T05:00:00.000Z,0 CVE-2003-0001,https://securityvulnerability.io/vulnerability/CVE-2003-0001,,"Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.",Linux,"Linux Kernel,Netbsd,Windows 2000 Terminal Services,Windows 2000,FreeBSD",,,0.2571899890899658,false,false,false,false,,false,false,2003-01-17T05:00:00.000Z,0 CVE-1999-1339,https://securityvulnerability.io/vulnerability/CVE-1999-1339,,"Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command.",Linux,"Linux Kernel,FreeBSD",,,0.015209999866783619,false,false,false,false,,false,false,1999-12-31T05:00:00.000Z,0