CVE & Exploit Intelligence Database

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
12,131 results Clear all
CVE-2005-0756 EPSS 0.00
Linux Kernel - Resource Management Error
ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).
CWE-399 Jun 08, 2005
CVE-2005-1765 EPSS 0.00
Linux Kernel - Denial of Service
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
May 31, 2005
CVE-2005-1589 1 PoC Analysis EPSS 0.00
Linux Kernel < 2.6.12 - Denial of Service
The pkt_ioctl function in the pktcdvd block device ioctl handler (pktcdvd.c) in Linux kernel 2.6.12-rc4 and earlier calls the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space and allows local users to cause a denial of service and possibly execute arbitrary code, a similar vulnerability to CVE-2005-1264.
May 17, 2005
CVE-2005-1264 EPSS 0.00
Linux kernel 2.6.x - Use After Free
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
May 17, 2005
CVE-2005-1263 1 PoC Analysis EPSS 0.00
Linux kernel <2.6.12-rc4 - Code Injection
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
May 11, 2005
CVE-2005-0530 EPSS 0.00
Linux kernel <2.6.12 - Info Disclosure
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
May 02, 2005
CVE-2005-0137 EPSS 0.00
Linux Kernel - Denial of Service
Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a "missing Itanium syscall table entry."
May 02, 2005
CVE-2005-0977 EPSS 0.00
Linux kernel <2.6 - DoS
The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address.
May 02, 2005
CVE-2005-0207 EPSS 0.00
Conectiva Linux - Denial of Service
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT.
May 02, 2005
CVE-2005-0210 EPSS 0.00
Linux Kernel - Resource Management Error
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
CWE-399 May 02, 2005
CVE-2005-0001 EPSS 0.01
Linux kernel <2.2.8, <2.4.30, <2.6.11 - RCE
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
May 02, 2005
CVE-2005-0532 EPSS 0.00
Linux Kernel - Buffer Overflow
The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types.
May 02, 2005
CVE-2005-1368 EPSS 0.00
Linux kernel <2.6.11.8 - DoS
The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow attackers to cause a denial of service (oops) via SMP.
May 02, 2005
CVE-2005-1369 EPSS 0.00
Linux <2.6.11.8-2.6.12-rc2 - DoS
The (1) it87 and (2) via686a drivers in I2C for Linux 2.6.x before 2.6.11.8, and 2.6.12 before 2.6.12-rc2, create the sysfs "alarms" file with write permissions, which allows local users to cause a denial of service (CPU consumption) by attempting to write to the file, which does not have an associated store function.
May 02, 2005
CVE-2005-0867 EPSS 0.00
Linux kernel <2.6 - Buffer Overflow
Integer overflow in Linux kernel 2.6 allows local users to overwrite kernel memory by writing to a sysfs file.
May 02, 2005
CVE-2005-0916 1 PoC Analysis EPSS 0.00
Linux Kernel - Denial of Service
AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of service (system panic) via a process that executes the io_queue_init function but exits without running io_queue_release, which causes exit_aio and is_hugepage_only_range to fail.
May 02, 2005
CVE-2005-0839 EPSS 0.00
Linux kernel <2.6.11 - Privilege Escalation
Linux kernel 2.6 before 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
May 02, 2005
CVE-2005-0815 1 PoC Analysis EPSS 0.11
Linux Kernel - Denial of Service
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.
May 02, 2005
CVE-2005-0400 EPSS 0.00
Linux kernel <2.6.11.6 - Info Disclosure
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
May 02, 2005
CVE-2005-0529 EPSS 0.00
Linux Kernel - Buffer Overflow
Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
May 02, 2005