CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
12,131 results Clear all
CVE-2009-1389 EPSS 0.08
Linux Kernel - Memory Corruption
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
CWE-119 Jun 16, 2009
CVE-2009-1961 4.7 MEDIUM 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.30-rc3 - DoS
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
CWE-667 Jun 08, 2009
CVE-2009-1914 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.29 - DoS
The pci_register_iommu_region function in arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on the sparc64 platform allows local users to cause a denial of service (system crash) by reading the /proc/iomem file, related to uninitialized pointers and the request_resource function.
CWE-20 Jun 04, 2009
CVE-2009-1385 EPSS 0.14
Intel E1000 < 7.4.35 - Numeric Error
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
CWE-189 Jun 04, 2009
CVE-2009-1633 EPSS 0.02
Linux Kernel < 2.6.29.4 - Memory Corruption
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
CWE-119 May 28, 2009
CVE-2009-1630 EPSS 0.00
Linux Kernel < 2.6.29.3 - Access Control
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
CWE-264 May 14, 2009
CVE-2009-1527 1 PoC Analysis EPSS 0.00
Linux Kernel < 2.6.29 - Race Condition
Race condition in the ptrace_attach function in kernel/ptrace.c in the Linux kernel before 2.6.30-rc4 allows local users to gain privileges via a PTRACE_ATTACH ptrace call during an exec system call that is launching a setuid application, related to locking an incorrect cred_exec_mutex object.
CWE-362 May 05, 2009
CVE-2009-1184 EPSS 0.00
Linux kernel <2.6.27.22, <2.6.28.x - Privilege Escalation
The selinux_ip_postroute_iptables_compat function in security/selinux/hooks.c in the SELinux subsystem in the Linux kernel before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is enabled, omits calls to avc_has_perm for the (1) node and (2) port, which allows local users to bypass intended restrictions on network traffic. NOTE: this was incorrectly reported as an issue fixed in 2.6.27.21.
CWE-16 May 05, 2009
CVE-2009-1439 EPSS 0.02
Linux Kernel < 2.6.29 - Memory Corruption
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
CWE-119 Apr 27, 2009
CVE-2009-1192 EPSS 0.00
Linux kernel <2.6.30-rc3 - Info Disclosure
The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
Apr 24, 2009
CVE-2009-1360 EPSS 0.02
Linux Kernel < 2.6.28.9 - Denial of Service
The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
Apr 22, 2009
CVE-2009-1338 EPSS 0.00
Linux Kernel < 2.6.27.21 - Access Control
The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.
CWE-264 Apr 22, 2009
CVE-2009-1337 1 PoC Analysis EPSS 0.00
Linux Kernel < 2.6.29 - Access Control
The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
CWE-264 Apr 22, 2009
CVE-2009-1336 EPSS 0.00
Linux Kernel < 2.6.22.19 - Improper Input Validation
fs/nfs/client.c in the Linux kernel before 2.6.23 does not properly initialize a certain structure member that stores the maximum NFS filename length, which allows local users to cause a denial of service (OOPS) via a long filename, related to the encode_lookup function.
CWE-20 Apr 22, 2009
CVE-2009-1265 EPSS 0.02
Linux Kernel - Numeric Error
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
CWE-189 Apr 08, 2009
CVE-2009-1243 5.5 MEDIUM EPSS 0.00
Linux Kernel < 2.6.29.1 - Improper Locking
net/ipv4/udp.c in the Linux kernel before 2.6.29.1 performs an unlocking step in certain incorrect circumstances, which allows local users to cause a denial of service (panic) by reading zero bytes from the /proc/net/udp file and unspecified other files, related to the "udp seq_file infrastructure."
CWE-667 Apr 06, 2009
CVE-2009-1242 EPSS 0.00
Linux Kernel < 2.6.29.1 - Improper Input Validation
The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX implementation in the KVM subsystem in the Linux kernel before 2.6.29.1 on the i386 platform allows guest OS users to cause a denial of service (OOPS) by setting the EFER_LME (aka "Long mode enable") bit in the Extended Feature Enable Register (EFER) model-specific register, which is specific to the x86_64 platform.
CWE-20 Apr 06, 2009
CVE-2009-1072 EPSS 0.01
Linux kernel <2.6.28.9 - Privilege Escalation
nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
CWE-16 Mar 25, 2009
CVE-2009-0787 EPSS 0.00
Linux kernel <2.6.28.9 - Info Disclosure
The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.
CWE-189 Mar 25, 2009
CVE-2009-1046 1 PoC Analysis EPSS 0.00
Linux Kernel - Resource Management Error
The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
CWE-399 Mar 23, 2009