Lucene search

K

CVE-2004-1235

🗓️ 14 Apr 2005 04:00:00Reported by mitreType 
cve
 cve
🔗 web.nvd.nist.gov👁 88 Views

CVE-2004-1235 Race condition in load_elf_library and binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Refs
Nvd
Node
OROROR
avayas8710Matchr2.0.0
OR
avayas8710Matchr2.0.1
OROROROR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OROROROROROROROROROROROROROROROROROROR
linuxlinux_kernelMatch2.4.18x86
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OROR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OROROR
linuxlinux_kernelMatch2.4.21pre1
OR
linuxlinux_kernelMatch2.4.21pre4
OR
linuxlinux_kernelMatch2.4.21pre7
OROROR
linuxlinux_kernelMatch2.4.23pre9
OR
linuxlinux_kernelMatch2.4.23_ow2
OROR
linuxlinux_kernelMatch2.4.24_ow1
OROROROR
linuxlinux_kernelMatch2.4.27pre1
OR
linuxlinux_kernelMatch2.4.27pre2
OR
linuxlinux_kernelMatch2.4.27pre3
OR
linuxlinux_kernelMatch2.4.27pre4
OR
linuxlinux_kernelMatch2.4.27pre5
OROR
linuxlinux_kernelMatch2.4.29rc2
OROR
linuxlinux_kernelMatch2.6.0test1
OR
linuxlinux_kernelMatch2.6.0test10
OR
linuxlinux_kernelMatch2.6.0test11
OR
linuxlinux_kernelMatch2.6.0test2
OR
linuxlinux_kernelMatch2.6.0test3
OR
linuxlinux_kernelMatch2.6.0test4
OR
linuxlinux_kernelMatch2.6.0test5
OR
linuxlinux_kernelMatch2.6.0test6
OR
linuxlinux_kernelMatch2.6.0test7
OR
linuxlinux_kernelMatch2.6.0test8
OR
linuxlinux_kernelMatch2.6.0test9
OROR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OROROROROROR
linuxlinux_kernelMatch2.6.6rc1
OROR
linuxlinux_kernelMatch2.6.7rc1
OROR
linuxlinux_kernelMatch2.6.8rc1
OR
linuxlinux_kernelMatch2.6.8rc2
OR
linuxlinux_kernelMatch2.6.8rc3
OR
linuxlinux_kernelMatch2.6.92.6.20
OROR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6_test9_cvs
OROROROROROROROROROR
redhatenterprise_linuxMatch3.0advanced_servers
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation
OR
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation
OROROR
redhatfedora_coreMatchcore_1.0
OR
redhatfedora_coreMatchcore_2.0
OR
redhatfedora_coreMatchcore_3.0
OR
redhatlinuxMatch7.3i386
OR
redhatlinuxMatch9.0i386
OR
susesuse_linuxMatch1.0desktop
OR
susesuse_linuxMatch8enterprise_server
OROROROR
susesuse_linuxMatch9.0enterprise_server
OROROR
ubuntuubuntu_linuxMatch4.1ia64
OR
Node
OROR
avayas8300Matchr2.0.0
OR
avayas8300Matchr2.0.1
OR
avayas8500Matchr2.0.0
OR
avayas8500Matchr2.0.1
OR
avayas8700Matchr2.0.0
OR
avayas8700Matchr2.0.1
OR

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Apr 2005 04:00Current
7.5High risk
Vulners AI Score7.5
CVSS26.2
EPSS0.00083
88
.json
Report