CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,661 CVEs tracked 53,243 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,792 vendors 42,472 researchers
12,131 results Clear all
CVE-2005-2490 EPSS 0.00
Linux Kernel - Buffer Overflow
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Sep 14, 2005
CVE-2005-2492 EPSS 0.00
Canonical Ubuntu Linux - Access Control
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
CWE-264 Sep 14, 2005
CVE-2005-2872 EPSS 0.06
Linux kernel <2.6.12 - DoS
The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
Sep 09, 2005
CVE-2005-2873 EPSS 0.00
Linux kernel <2.6.12 - DoS
The ipt_recent kernel module (ipt_recent.c) in Linux kernel 2.6.12 and earlier does not properly perform certain time tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early, a different vulnerability than CVE-2005-2872.
Sep 09, 2005
CVE-2005-2801 7.5 HIGH EPSS 0.03
Linux kernel 2.6 - Info Disclosure
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
CWE-697 Sep 06, 2005
CVE-2005-2800 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.13 - DoS
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
CWE-399 Sep 06, 2005
CVE-2005-2459 EPSS 0.05
Linux Kernel - NULL Pointer Dereference
The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458.
CWE-476 Aug 23, 2005
CVE-2005-2098 EPSS 0.03
Linux Kernel - Denial of Service
The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.
Aug 23, 2005
CVE-2005-2099 EPSS 0.04
Linux Kernel - Resource Management Error
The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.
CWE-399 Aug 23, 2005
CVE-2005-2457 EPSS 0.05
Linux Kernel - Denial of Service
The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
Aug 23, 2005
CVE-2005-2458 EPSS 0.14
Linux Kernel - Denial of Service
inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
Aug 23, 2005
CVE-2005-2617 EPSS 0.00
Linux kernel <2.6.12 - Memory Leak
The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12 and later, on the 64-bit x86 platform, does not check the return value of the insert_vm_struct function, which allows local users to trigger a memory leak via a 32-bit application with crafted ELF headers.
Aug 17, 2005
CVE-2005-2555 EPSS 0.00
Debian Linux - Access Control
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
CWE-264 Aug 16, 2005
CVE-2005-2553 EPSS 0.00
Linux Kernel - Denial of Service
The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.
Aug 12, 2005
CVE-2005-2548 EPSS 0.02
Linux Kernel - Resource Management Error
vlan_dev.c in the VLAN code for Linux kernel 2.6.8 allows remote attackers to cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument, as demonstrated using snmpwalk on snmpd.
CWE-399 Aug 12, 2005
CVE-2005-2500 EPSS 0.03
Linux Kernel < 2.6.5 - Buffer Overflow
Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol.
Aug 08, 2005
CVE-2005-2456 5.5 MEDIUM EPSS 0.00
Linux Kernel - Improper Locking
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array.
CWE-667 Aug 04, 2005
CVE-2005-1762 EPSS 0.00
Linux Kernel - Denial of Service
The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address.
Aug 02, 2005
CVE-2005-1768 EPSS 0.00
Linux Kernel - Buffer Overflow
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
Jul 11, 2005
CVE-2005-1265 EPSS 0.00
Linux Kernel <2.6.10 - DoS
The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
Jun 16, 2005