Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 314,343
With exploit
linux / linux_kernel
You can search for specific versions with
https://synscan.net/product/linux_kernel/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2006-1862
Low
May 24, 2006
== 2.6.9-2.6.20
CVE-2006-1864
Low
Apr 26, 2006
== 2.6.16.8
== 2.6.16-rc6
== 2.6.16-rc1
== 2.6.16.4
== 2.6.16.1
== 2.6.16-rc5
== 2.6.16.3
== 2.6.16-rc4
== 2.6.16
== 2.6.16_rc7
== 2.6.16.2
== 2.6.16-rc3
== 2.6.16.7
== 2.6.16-rc2
CVE-2006-1863
Low
Apr 25, 2006
<= 2.6.17
CVE-2005-3359
Low
Dec 31, 2005
== 2.6.11-rc3
== 2.6.8.1.5
== 2.6.0
== 2.6.11
== 2.6.12-rc1
== 2.6.12-rc4
== 2.6.11.2
== 2.6.5
== 2.6.11.10
== 2.6.1
== 2.6.13
== 2.6.13.3
== 2.6.11.8
== 2.6.11_rc1_bk6
== 2.6.10
== 2.6.13-rc1
== 2.6.13-rc6
== 2.6.11.6
== 2.6.11.11
== 2.6.0-test5
== 2.6.3
== 2.6.13-rc7
== 2.6.0-test2
== 2.6.4
== 2.6_test9_cvs
== 2.6.11.5
== 2.6.7-rc1
== 2.6.2
== 2.6.13.2
== 2.6.12-rc5
== 2.6.8-rc1
== 2.6.0-test11
== 2.6.1-rc2
== 2.6.11-rc4
== 2.6.8
== 2.6.0-test1
== 2.6.12.5
== 2.6.0-test6
== 2.6.12.1
== 2.6.11.9
== 2.6.10-rc2
== 2.6.0-test4
== 2.6.13.4
== 2.6.12.2
== 2.6.11-rc1
== 2.6.0-test10
== 2.6.0-test9
== 2.6.12.4
== 2.6.11.3
== 2.6.12.3
== 2.6.13-rc4
== 2.6.7
== 2.6.11-rc2
== 2.6.1-rc1
== 2.6.6-rc1
== 2.6.9-2.6.20
== 2.6.12.6
== 2.6.11.7
== 2.6.0-test7
== 2.6.8.1
== 2.6.8-rc2
== 2.6.8-rc3
== 2.6.11.4
== 2.6.11.12
== 2.6.0-test8
== 2.6.11.1
== 2.6.13.1
== 2.6.6
== 2.6.0-test3
== 2.6.12
CVE-2005-4351
Low
Dec 31, 2005
<= 2.6.15
CVE-2005-4352
Low
Dec 31, 2005
== 2.6_test9_cvs
== 2.6.0
== 2.6.0-test1
== 2.6.0-test10
== 2.6.0-test11
== 2.6.0-test2
== 2.6.0-test3
== 2.6.0-test4
== 2.6.0-test5
== 2.6.0-test6
== 2.6.0-test7
== 2.6.0-test8
== 2.6.0-test9
== 2.6.1
== 2.6.1-rc1
== 2.6.1-rc2
== 2.6.10
== 2.6.10-rc2
== 2.6.11
== 2.6.11-rc2
== 2.6.11-rc3
== 2.6.11-rc4
== 2.6.11.11
== 2.6.11.12
== 2.6.11.5
== 2.6.11.6
== 2.6.11.7
== 2.6.11.8
== 2.6.12-rc1
== 2.6.12-rc4
== 2.6.12-rc5
== 2.6.12.1
== 2.6.12.2
== 2.6.12.3
== 2.6.12.4
== 2.6.12.5
== 2.6.12.6
== 2.6.13
== 2.6.13-rc1
== 2.6.13-rc4
== 2.6.13-rc6
== 2.6.13-rc7
== 2.6.13.1
== 2.6.13.2
== 2.6.13.3
== 2.6.13.4
== 2.6.14
== 2.6.14-rc1
== 2.6.14-rc2
== 2.6.14-rc3
== 2.6.14-rc4
== 2.6.14.1
== 2.6.14.2
== 2.6.14.3
== 2.6.15
== 2.6.15-rc1
== 2.6.15-rc3
== 2.6.2
== 2.6.3
== 2.6.4
== 2.6.5
== 2.6.6
== 2.6.6-rc1
== 2.6.7
== 2.6.7-rc1
== 2.6.8
== 2.6.8-rc1
== 2.6.8-rc2
== 2.6.8-rc3
== 2.6.9-2.6.20
CVE-2005-3358
Low
Dec 14, 2005
== 2.6.11-rc3
== 2.6.4-rc3
== 2.6.11
== 2.6.12-rc1
== 2.6.12-rc4
== 2.6.14-rc2
== 2.6.4-rc1
== 2.6.11.2
== 2.6.5
== 2.6.11.10
== 2.6.10-rc3
== 2.6.13-rc5
== 2.6.1
== 2.6.7-rc3
== 2.6.3-rc2
== 2.6.13
== 2.6.13.3
== 2.6.11.8
<= 2.6.14.7
== 2.6.14.4
== 2.6.14
== 2.6.10
== 2.6.13-rc1
== 2.6.14.3
== 2.6.13-rc6
== 2.6.11.6
== 2.6.11.11
== 2.6.3
== 2.6.13-rc7
== 2.6.9-rc1
== 2.6.4
== 2.6.13-rc2
== 2.6.11.5
== 2.6.7-rc1
== 2.6.9-rc3
== 2.6.8-rc4
== 2.6.6-rc3
== 2.6.14.5
== 2.6.13.2
== 2.6.12-rc5
== 2.6.1-rc3
== 2.6.8-rc1
== 2.6.14-rc3
== 2.6.4-rc2
== 2.6.13.5
== 2.6.12-rc2
== 2.6.1-rc2
== 2.6.11-rc4
== 2.6.8
== 2.6.3-rc3
== 2.6.14.1
== 2.6.12.5
== 2.6.7-rc2
== 2.6.12-rc3
== 2.6.14.6
== 2.6.12.1
== 2.6.11.9
== 2.6.10-rc2
== 2.6.0
== 2.6.5-rc1
== 2.6.13.4
== 2.6.12.2
== 2.6.11-rc1
== 2.6.14-rc1
== 2.6.6-rc2
== 2.6.9-rc2
== 2.6.10-rc1
== 2.6.12.4
== 2.6.11.3
== 2.6.9-rc4
== 2.6.12.3
== 2.6.13-rc4
== 2.6.7
== 2.6.11-rc2
== 2.6.3-rc4
== 2.6.1-rc1
== 2.6.6-rc1
== 2.6.12.6
== 2.6.11.7
== 2.6.5-rc2
== 2.6.14.2
== 2.6.14-rc4
== 2.6.5-rc3
== 2.6.14-rc5
== 2.6.8.1
== 2.6.12-rc6
== 2.6.13-rc3
== 2.6.11-rc5
== 2.6.8-rc2
== 2.6.3-rc1
== 2.6.8-rc3
== 2.6.11.4
== 2.6.11.12
== 2.6.11.1
== 2.6.9
== 2.6.13.1
== 2.6.6
== 2.6.12
CVE-2005-2708
Low
Oct 25, 2005
== 2.4.18-pre1
== 2.4.15
== 2.4.30-rc3
== 2.4.0-test1
== 2.4.11
== 2.4.32
== 2.4.27-pre3
== 2.4.18-pre3
== 2.4.18-pre5
== 2.4.26
== 2.4.0-test6
== 2.4.19-pre1
== 2.4.21-pre7
== 2.4.27-pre2
== 2.4.12
== 2.4.13
== 2.4.19-pre4
== 2.4.17
== 2.4.21-pre1
== 2.4.21
== 2.4.23_ow2
== 2.4.23
== 2.4.29-rc2
== 2.4.32-pre1
== 2.4.0-test3
== 2.4.7
== 2.4.29-rc1
== 2.4.25
== 2.4.0-test8
== 2.4.24
== 2.4.9
== 2.4.23-pre9
== 2.4.31-pre1
== 2.4.30
== 2.4.28
== 2.4.0-test7
== 2.4.24_ow1
== 2.4.18-pre4
== 2.4.19-pre6
== 2.4.10
== 2.4.0
== 2.4.2
== 2.4.30-rc2
== 2.4.19-pre2
== 2.4.0-test12
== 2.4.18-pre6
== 2.4.16
== 2.4.8
== 2.4.19-pre3
== 2.4.19
== 2.4.27-pre5
== 2.4.14
== 2.4.27-pre1
== 2.4.0-test2
== 2.4.18
== 2.4.19-pre5
== 2.4.21-pre4
== 2.4.22
== 2.4.0-test5
== 2.4.5
== 2.4.27-pre4
== 2.4.3
== 2.4.1
== 2.4.4
== 2.4.18-pre2
== 2.4.18-pre8
== 2.4.27
== 2.4.0-test11
== 2.4.6
== 2.4.31
== 2.4.0-test4
== 2.4.0-test10
== 2.4.29
== 2.4.20
== 2.4.0-test9
== 2.4.18-pre7
== 2.4.32-pre2
CVE-2005-3257
Low
Oct 18, 2005
== 2.6.14.4
== 2.6.12
CVE-2005-3105
Low
Sep 30, 2005
== 2.6.0
‹
›
‹
1
2
...
68
69
70
71
72
73
›