CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,613 CVEs tracked 53,239 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,918 Nuclei templates 37,790 vendors 42,464 researchers
12,131 results Clear all
CVE-2002-1574 EPSS 0.00
Linux <2.4.20 - Buffer Overflow
Buffer overflow in the ixj telephony card driver in Linux before 2.4.20 has unknown impact and attack vectors.
Mar 03, 2004
CVE-2004-0010 EPSS 0.00
Linux Kernel - Buffer Overflow
Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
Mar 03, 2004
CVE-2004-0077 2 PoCs Analysis EPSS 0.00
Linux <2.2.25, <2.4.24, <2.6.2 - Privilege Escalation
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
Mar 03, 2004
CVE-2004-2136 EPSS 0.00
Linux kernel <2.6 - Info Disclosure
dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
Feb 19, 2004
CVE-2004-0001 EPSS 0.00
Linux kernel < - Privilege Escalation
Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.
Feb 17, 2004
CVE-2004-0058 EPSS 0.00
Antivir/Linux <2.0.9-9 - Local Privilege Escalation
Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file.
Feb 17, 2004
CVE-2003-0985 3 PoCs Analysis EPSS 0.01
Linux Kernel - Denial of Service
The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077.
Jan 20, 2004
CVE-2003-0984 EPSS 0.00
Linux kernel <2.4.23 - Info Disclosure
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
Jan 05, 2004
CVE-2003-0986 EPSS 0.00
Linux Kernel - Denial of Service
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.
Dec 31, 2003
CVE-2003-1161 EPSS 0.00
Linux kernel <2.6-test9-CVS - Privilege Escalation
exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function.
Dec 31, 2003
CVE-2003-0956 EPSS 0.00
Linux kernel <2.4.22 - Info Disclosure
Multiple race conditions in the handling of O_DIRECT in Linux kernel prior to version 2.4.22 could cause stale data to be returned from the disk when handling sparse files, or cause incorrect data to be returned when a file is truncated as it is being read, which might allow local users to obtain sensitive data that was originally owned by other users, a different vulnerability than CVE-2003-0018.
Dec 31, 2003
CVE-2003-0961 EXPLOITED 2 PoCs Analysis EPSS 0.01
Linux kernel <2.4.22 - Privilege Escalation
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
Dec 15, 2003
CVE-2003-0467 EPSS 0.01
Linux kernel <2.5.x - DoS
Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a denial of service (crash) in systems using NAT, possibly due to an integer signedness error.
Aug 27, 2003
CVE-2003-0619 1 PoC Analysis EPSS 0.06
Linux kernel <2.4.21 - DoS
Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.
Aug 27, 2003
CVE-2003-0187 EPSS 0.01
Linux Kernel - Denial of Service
The connection tracking core of Netfilter for Linux 2.4.20, with CONFIG_IP_NF_CONNTRACK enabled or the ip_conntrack module loaded, allows remote attackers to cause a denial of service (resource consumption) due to an inconsistency with Linux 2.4.20's support of linked lists, which causes Netfilter to fail to identify connections with an UNCONFIRMED status and use large timeouts.
Aug 27, 2003
CVE-2003-0462 1 PoC Analysis EPSS 0.00
Linux 2.4 - DoS
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
Aug 27, 2003
CVE-2003-0465 EPSS 0.00
Linux <2.6 - Info Disclosure
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
Aug 18, 2003
CVE-2003-0476 EPSS 0.00
Linux 2.4.x - Info Disclosure
The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.
Aug 07, 2003
CVE-2003-0501 1 PoC Analysis EPSS 0.00
Linux - Info Disclosure
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
Aug 07, 2003
CVE-2003-0643 EPSS 0.00
Linux <2.4.22 - DoS
Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash).
Jul 25, 2003