cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-8539,https://securityvulnerability.io/vulnerability/CVE-2015-8539,,"The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.",Suse,"Linux Enterprise Real Time Extension,Ubuntu Linux",7.8,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2016-02-08T02:00:00.000Z,0 CVE-2004-1235,https://securityvulnerability.io/vulnerability/CVE-2004-1235,,Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.,Suse,"Suse Linux,Linux Kernel,Fedora Core,Enterprise Linux,Mandrake Linux Corporate Server,Enterprise Linux Desktop,Ubuntu Linux,Mandrake Linux,Modular Messaging Message Storage Server,S8710,Converged Communications Server,Mn100,Linux,Network Routing",,,0.0004600000102072954,false,,false,false,false,,,false,false,,2005-04-14T04:00:00.000Z,0 CVE-2005-0384,https://securityvulnerability.io/vulnerability/CVE-2005-0384,,Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.,Suse,"Suse Linux,Enterprise Linux,Ubuntu Linux,Secure Linux",,,0.1658100038766861,false,,false,false,false,,,false,false,,2005-03-15T05:00:00.000Z,0 CVE-2004-0883,https://securityvulnerability.io/vulnerability/CVE-2004-0883,,"Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Ubuntu Linux,Linux Advanced Workstation",,,0.14609000086784363,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0 CVE-2004-0949,https://securityvulnerability.io/vulnerability/CVE-2004-0949,,"The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.",Suse,"Suse Linux,Linux Kernel,Enterprise Linux,Fedora Core,Secure Linux,Enterprise Linux Desktop,Ubuntu Linux,Linux Advanced Workstation",,,0.03804999962449074,false,,false,false,false,,,false,false,,2005-01-10T05:00:00.000Z,0