cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2005-0001,https://securityvulnerability.io/vulnerability/CVE-2005-0001,,"Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.",Linux,"Linux Kernel,Enterprise Linux,Enterprise Linux Desktop,Secure Linux",,,0.0006500000017695129,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2004-0685,https://securityvulnerability.io/vulnerability/CVE-2004-0685,,"Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.",Linux,"Linux Kernel,Secure Linux,Enterprise Linux Desktop,Enterprise Linux",,,0.001769999973475933,false,false,false,false,,false,false,2004-12-23T05:00:00.000Z,0 CVE-2004-0415,https://securityvulnerability.io/vulnerability/CVE-2004-0415,,"Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.",Linux,"Linux Kernel,Secure Linux,Fedora Core",,,0.0004199999966658652,false,false,false,false,,false,false,2004-11-23T05:00:00.000Z,0 CVE-2002-1319,https://securityvulnerability.io/vulnerability/CVE-2002-1319,,"The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.",Linux,"Linux Kernel,Secure Linux",,,0.0004199999966658652,false,false,false,false,,false,false,2002-12-11T05:00:00.000Z,0