CVE & Exploit Intelligence Database

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
12,131 results Clear all
CVE-2004-0138 EPSS 0.00
Linux Kernel - Denial of Service
The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.
Dec 31, 2004
CVE-2004-2607 EPSS 0.00
Linux kernel <2.6.5 & <2.4.29-rc1 - Info Disclosure
A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.
Dec 31, 2004
CVE-2004-1017 EPSS 0.02
Linux kernel 2.4.x - Buffer Overflow
Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.
Dec 31, 2004
CVE-2004-2013 7.8 HIGH EPSS 0.00
Linux Kernel < 2.4.25 - Integer Overflow
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
CWE-190 Dec 31, 2004
CVE-2004-0997 EPSS 0.00
Linux kernel <2.4.17 - Privilege Escalation
Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors.
Dec 31, 2004
CVE-2004-2731 EPSS 0.00
Linux Kernel - Numeric Error
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
CWE-189 Dec 31, 2004
CVE-2004-2660 EPSS 0.00
Linux Kernel - Denial of Service
Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests.
Dec 31, 2004
CVE-2004-2302 EPSS 0.00
Linux kernel <2.6.10 - Info Disclosure, DoS
Race condition in the sysfs_read_file and sysfs_write_file functions in Linux kernel before 2.6.10 allows local users to read kernel memory and cause a denial of service (crash) via large offsets in sysfs files.
Dec 31, 2004
CVE-2004-2536 EPSS 0.00
Linux kernel 2.6-2.6.5 - Privilege Escalation
The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges.
Dec 31, 2004
CVE-2004-0685 EPSS 0.00
Linux 2.4 - Info Disclosure
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Dec 23, 2004
CVE-2004-0816 7.5 HIGH 1 PoC Analysis EPSS 0.07
Linux <2.6.8 - DoS
Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.
CWE-191 Dec 23, 2004
CVE-2004-0814 EPSS 0.00
Linux 2.4.x-2.6.8 - Info Disclosure
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
Dec 23, 2004
CVE-2004-1335 1 PoC Analysis EPSS 0.00
Linux Kernel - Denial of Service
Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.
Dec 15, 2004
CVE-2004-1333 1 PoC Analysis EPSS 0.00
Linux Kernel - Buffer Overflow
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
Dec 15, 2004
CVE-2004-0497 1 PoC Analysis EPSS 0.00
Linux kernel <2.x - Privilege Escalation
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Dec 06, 2004
CVE-2004-0565 EPSS 0.00
Linux 2.4.x - Info Disclosure
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Dec 06, 2004
CVE-2004-0626 EPSS 0.02
Linux kernel 2.6 - DoS
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.
Dec 06, 2004
CVE-2004-0496 EPSS 0.00
Linux kernel <2.6 - Privilege Escalation
Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool.
Dec 06, 2004
CVE-2004-0415 1 PoC Analysis EPSS 0.00
Linux kernel - Info Disclosure
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Nov 23, 2004
CVE-2004-0228 1 PoC Analysis EPSS 0.00
Linux kernel <2.6 - Privilege Escalation
Integer signedness error in the cpufreq proc handler (cpufreq_procctl) in Linux kernel 2.6 allows local users to gain privileges.
Aug 18, 2004