CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,819 CVEs tracked 53,239 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,800 vendors 42,488 researchers
12,131 results Clear all
CVE-2009-0935 5.5 MEDIUM EPSS 0.00
Linux Kernel < 2.6.27.13 - Improper Locking
The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
CWE-667 Mar 18, 2009
CVE-2009-0778 EPSS 0.01
Linux kernel <2.6.25 - DoS
The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an "rt_cache leak."
Mar 12, 2009
CVE-2009-0859 EPSS 0.00
Linux Kernel < 2.6.28.4 - Improper Input Validation
The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
CWE-20 Mar 09, 2009
CVE-2009-0835 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.28.7 - Privilege Escalation
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
CWE-264 Mar 06, 2009
CVE-2009-0834 EPSS 0.00
Linux kernel <2.6.28.7 - Privilege Escalation
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
Mar 06, 2009
CVE-2009-0748 EPSS 0.00
Linux kernel <2.6.27.19-2.6.28.7 - DoS
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.
CWE-20 Feb 27, 2009
CVE-2009-0747 EPSS 0.00
Linux kernel <2.6.27.19-2.6.28.7 - DoS
The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
CWE-399 Feb 27, 2009
CVE-2009-0746 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.27.19-2.6.28.7 - DoS
The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
CWE-20 Feb 27, 2009
CVE-2009-0745 EPSS 0.00
Linux kernel <2.6.27.19-2.6.28.7 - DoS
The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
CWE-20 Feb 27, 2009
CVE-2009-0028 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.28 - Privilege Escalation
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
CWE-264 Feb 27, 2009
CVE-2009-0676 1 PoC Analysis EPSS 0.00
Linux <2.6.28.6 - Info Disclosure
The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
CWE-264 Feb 22, 2009
CVE-2009-0675 EPSS 0.00
Linux kernel <2.6.28.6 - Privilege Escalation
The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.
CWE-264 Feb 22, 2009
CVE-2009-0605 EPSS 0.00
Linux Kernel <2.6.28.5 - Memory Corruption
Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe.
CWE-119 Feb 17, 2009
CVE-2008-6107 EPSS 0.00
Linux kernel <2.6.25.4 - DoS
The (1) sys32_mremap function in arch/sparc64/kernel/sys_sparc32.c, the (2) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c, and the (3) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel before 2.6.25.4, omit some virtual-address range (aka span) checks when the mremap MREMAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mremap calls, a related issue to CVE-2008-2137.
CWE-399 Feb 10, 2009
CVE-2009-0322 EPSS 0.00
Linux kernel <2.6.27.13, 2.6.28.x <2.6.28.2 - DoS
drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
CWE-399 Jan 28, 2009
CVE-2009-0269 EPSS 0.00
Linux kernel <2.6.28.1 - DoS
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
CWE-787 Jan 26, 2009
CVE-2009-0031 EPSS 0.00
Linux kernel <2.6.29-rc2 - DoS
Memory leak in the keyctl_join_session_keyring function (security/keys/keyctl.c) in Linux kernel 2.6.29-rc2 and earlier allows local users to cause a denial of service (kernel memory consumption) via unknown vectors related to a "missing kfree."
CWE-399 Jan 21, 2009
CVE-2009-0029 EPSS 0.00
Linux kernel <2.6.28 - DoS
The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
CWE-20 Jan 15, 2009
CVE-2009-0024 EPSS 0.00
Linux kernel <2.6.24.1 - DoS/Privilege Escalation
The sys_remap_file_pages function in mm/fremap.c in the Linux kernel before 2.6.24.1 allows local users to cause a denial of service or gain privileges via unspecified vectors, related to the vm_file structure member, and the mmap_region and do_munmap functions.
CWE-264 Jan 13, 2009
CVE-2008-4307 EPSS 0.00
Linux Kernel < 2.6.25.9 - Race Condition
Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.
CWE-362 Jan 13, 2009