CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,819 CVEs tracked 53,239 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,800 vendors 42,488 researchers
12,131 results Clear all
CVE-2007-5500 EPSS 0.00
Linux Kernel < 2.6.23.7 - Denial of Service
The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.
Nov 20, 2007
CVE-2007-5501 EPSS 0.07
Linux Kernel - Resource Management Error
The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
CWE-399 Nov 15, 2007
CVE-2007-5904 EPSS 0.02
Linux kernel <2.6.23 - Buffer Overflow
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
CWE-119 Nov 09, 2007
CVE-2007-4997 EPSS 0.05
Linux Kernel < 2.6.22.7 - Numeric Error
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
CWE-189 Nov 06, 2007
CVE-2007-3850 EPSS 0.00
Linux Kernel < 2.6.21 - Information Disclosure
The eHCA driver in Linux kernel 2.6 before 2.6.22, when running on PowerPC, does not properly map userspace resources, which allows local users to read portions of physical address space.
CWE-200 Oct 23, 2007
CVE-2007-4133 EPSS 0.00
Linux kernel <2.6.19-rc4 - DoS
The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE units, which allows local users to cause a denial of service (panic) via unspecified vectors.
Oct 04, 2007
CVE-2007-5093 EPSS 0.00
Linux Kernel - Resource Management Error
The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 "relies on user space to close the device," which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked. NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device.
CWE-399 Sep 26, 2007
CVE-2007-4571 1 PoC Analysis EPSS 0.00
ALSA <2.6.22.8 - Info Disclosure
The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
Sep 26, 2007
CVE-2007-5087 EPSS 0.00
Linux Kernel < 2.4.35.2 - Access Control
The ATM module in the Linux kernel before 2.4.35.3, when CLIP support is enabled, allows local users to cause a denial of service (kernel panic) by reading /proc/net/atm/arp before the CLIP module has been loaded.
CWE-264 Sep 26, 2007
CVE-2007-4573 2 PoCs Analysis EPSS 0.00
Linux kernel <2.6.22.7 - Privilege Escalation
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
CWE-264 Sep 24, 2007
CVE-2007-0997 EPSS 0.00
Linux kernel <2.6.17.7 - DoS/Info Disclosure
Race condition in the tee (sys_tee) system call in the Linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers.
CWE-362 Sep 18, 2007
CVE-2007-3731 EPSS 0.00
Linux Kernel - Improper Input Validation
The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and OOPS) via certain code that makes ptrace PTRACE_SETREGS and PTRACE_SINGLESTEP requests, related to the TRACE_IRQS_ON function, and possibly related to the arch_ptrace function.
CWE-20 Sep 17, 2007
CVE-2007-3740 EPSS 0.00
Linux Kernel < 2.6.21.7 - Access Control
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
CWE-264 Sep 14, 2007
CVE-2007-3848 EPSS 0.00
Linux kernel <2.4.35 - Privilege Escalation
Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
Aug 14, 2007
CVE-2007-4311 EPSS 0.01
Linux kernel <2.4.35 - Info Disclosure
The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator.
CWE-310 Aug 13, 2007
CVE-2007-3851 EPSS 0.00
Linux Kernel < 2.6.22.1 - Resource Management Error
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
CWE-399 Aug 13, 2007
CVE-2007-3843 EPSS 0.02
Linux kernel <2.6.23-rc1 - SSRF
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
Aug 09, 2007
CVE-2007-3105 EPSS 0.00
Linux Kernel < 2.6.22 - Memory Corruption
Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
CWE-119 Jul 27, 2007
CVE-2007-3380 EPSS 0.03
Linux Kernel - Denial of Service
The Distributed Lock Manager (DLM) in the cluster manager for Linux kernel 2.6.15 allows remote attackers to cause a denial of service (loss of lock services) by connecting to the DLM port, which probably prevents other processes from accessing the service.
CWE-16 Jul 20, 2007
CVE-2007-3720 EPSS 0.00
Linux Kernel - Denial of Service
The process scheduler in the Linux kernel 2.4 performs scheduling based on CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption) by performing voluntary nanosecond sleeps that result in the process not being active during a clock interrupt, as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
Jul 12, 2007