cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2004-1237,https://securityvulnerability.io/vulnerability/CVE-2004-1237,,Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.,Suse,"Suse Linux,Linux Kernel,Enterprise Linux Desktop,Enterprise Linux",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2005-04-14T04:00:00.000Z,0 CVE-2004-1235,https://securityvulnerability.io/vulnerability/CVE-2004-1235,,Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.,Suse,"Suse Linux,Linux Kernel,Fedora Core,Enterprise Linux,Mandrake Linux Corporate Server,Enterprise Linux Desktop,Ubuntu Linux,Mandrake Linux,Modular Messaging Message Storage Server,S8710,Converged Communications Server,Mn100,Linux,Network Routing",,,0.0004600000102072954,false,,false,false,false,,,false,false,,2005-04-14T04:00:00.000Z,0 CVE-2004-0887,https://securityvulnerability.io/vulnerability/CVE-2004-0887,,"SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.",Suse,"Suse Linux,Linux Kernel",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2005-01-27T05:00:00.000Z,0 CVE-2004-1073,https://securityvulnerability.io/vulnerability/CVE-2004-1073,,"The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Linux Advanced Workstation,Turbolinux Server",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-1070,https://securityvulnerability.io/vulnerability/CVE-2004-1070,,"The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Linux Advanced Workstation,Turbolinux Server",,,0.0006200000061653554,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-1072,https://securityvulnerability.io/vulnerability/CVE-2004-1072,,"The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Linux Advanced Workstation,Turbolinux Server",,,0.0008200000156648457,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-1071,https://securityvulnerability.io/vulnerability/CVE-2004-1071,,"The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Linux Advanced Workstation,Turbolinux Server",,,0.0006399999838322401,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-0883,https://securityvulnerability.io/vulnerability/CVE-2004-0883,,"Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Ubuntu Linux,Linux Advanced Workstation",,,0.14609000086784363,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-0949,https://securityvulnerability.io/vulnerability/CVE-2004-0949,,"The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Ubuntu Linux,Linux Advanced Workstation",,,0.03804999962449074,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0