Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 314,343
With exploit
linux / linux_kernel
You can search for specific versions with
https://synscan.net/product/linux_kernel/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2002-1573
High
Dec 31, 2002
== 2.4.18-pre1
== 2.4.15
== 2.4.0-test1
== 2.4.11
== 2.4.18-pre3
== 2.4.18-pre5
== 2.4.0-test6
== 2.4.19-pre1
== 2.4.12
== 2.4.13
== 2.4.19-pre4
== 2.4.17
== 2.4.0-test3
== 2.4.7
== 2.4.0-test8
== 2.4.9
== 2.4.0-test7
== 2.4.18-pre4
== 2.4.19-pre6
== 2.4.10
== 2.4.0
== 2.4.2
== 2.4.19-pre2
== 2.4.0-test12
== 2.4.18-pre6
== 2.4.16
== 2.4.8
== 2.4.19-pre3
== 2.4.19
== 2.4.14
== 2.4.0-test2
== 2.4.18
== 2.4.19-pre5
== 2.4.0-test5
== 2.4.5
== 2.4.3
== 2.4.1
== 2.4.4
== 2.4.18-pre2
== 2.4.18-pre8
== 2.4.0-test11
== 2.4.6
== 2.4.0-test4
== 2.4.0-test10
== 2.4.0-test9
== 2.4.18-pre7
CVE-2002-1963
Low
Dec 31, 2002
== 2.4.15
== 2.4.11
== 2.4.19-pre1
== 2.4.12
== 2.4.13
== 2.4.19-pre4
== 2.4.17
== 2.4.7
== 2.4.9
== 2.4.19-pre6
== 2.4.10
== 2.4.2
== 2.4.19-pre2
== 2.4.16
== 2.4.8
== 2.4.19-pre3
== 2.4.14
== 2.4.18
== 2.4.19-pre5
== 2.4.5
== 2.4.3
== 2.4.1
== 2.4.4
== 2.4.6
CVE-2002-1976
Low
Dec 31, 2002
== 2.4.15
== 2.2.10
== 2.4.11
== 2.2.13
== 2.2.0
== 2.2.6
== 2.4.19-pre1
== 2.4.12
== 2.4.13
== 2.4.19-pre4
== 2.2.18
== 2.2.3
== 2.4.17
== 2.2.2
== 2.3.0
== 2.2.5
== 2.4.7
== 2.3.99
== 2.2.8
== 2.4.9
== 2.2.7
== 2.2.16
== 2.2.1
== 2.2.12
== 2.4.19-pre6
== 2.4.10
== 2.4.0
== 2.4.2
== 2.4.19-pre2
== 2.4.16
== 2.4.8
== 2.4.19-pre3
== 2.4.14
== 2.2.19
== 2.4.18
== 2.4.19-pre5
== 2.2.20
== 2.4.5
== 2.2.15
== 2.2.4
== 2.4.3
== 2.2.14
== 2.2.11
== 2.4.1
== 2.4.4
== 2.2.17
== 2.4.6
== 2.2.9
CVE-2002-2254
Low
Dec 31, 2002
== 2.4.18-pre1
== 2.4.15
== 2.5.29
== 2.5.3
== 2.5.20
== 2.4.0-test1
== 2.5.12
== 2.4.11
== 2.5.21
== 2.5.0
== 2.5.13
== 2.4.18-pre3
== 2.4.11-pre3
== 2.4.18-pre5
== 2.5.14
== 2.4.0-test6
== 2.4.19-pre1
== 2.5.24
== 2.4.12
== 2.5.27
== 2.4.13
== 2.5.17
== 2.4.19-pre4
== 2.4.17
== 2.5.2
== 2.5.16
== 2.5.23
== 2.5.30
== 2.4.0-test3
== 2.4.0-test8
== 2.5.22
== 2.5.25
== 2.5.1
== 2.5.19
== 2.4.0-test7
== 2.4.18-pre9
== 2.4.18-pre4
== 2.4.19-pre6
== 2.4.10
== 2.4.0
== 2.4.19-pre2
== 2.4.0-test12
== 2.4.18-pre6
== 2.4.16
== 2.4.19-pre3
== 2.4.19
== 2.4.14
== 2.5.11
== 2.4.0-test2
== 2.4.19-pre5
== 2.5.18
== 2.4.0-test5
== 2.5.26
== 2.4.18
== 2.5.28
== 2.5.15
== 2.4.1
== 2.4.18-pre2
== 2.4.18-pre8
== 2.4.0-test11
== 2.5.10
== 2.4.0-test4
== 2.5.31
== 2.4.0-test10
== 2.4.0-test9
== 2.4.18-pre7
CVE-2002-1380
Low
Dec 23, 2002
== 2.2.10
== 2.2.21
== 2.2.13
== 2.2.6
== 2.2.18
== 2.2.3
== 2.2.2
== 2.2.22
== 2.2.5
== 2.2.8
== 2.2.7
== 2.2.16
== 2.2.1
== 2.2.12
== 2.2.23
== 2.2.19
== 2.2.20
== 2.2.15
== 2.2.4
== 2.2.14
== 2.2.11
== 2.2.17
== 2.2.9
CVE-2002-1319
Low
Dec 11, 2002
== 2.4.15
== 2.2.21
== 2.4.11
== 2.2.13
== 2.4.12
== 2.4.13
== 2.2.18
== 2.4.17
== 2.4.7
== 2.4.9
== 2.2.16
== 2.4.10
== 2.4.2
== 2.4.16
== 2.4.8
== 2.4.19
== 2.4.14
== 2.2.19
== 2.2.20
== 2.4.5
== 2.2.15
== 2.4.18
== 2.4.3
== 2.2.14
== 2.4.1
== 2.4.4
== 2.2.17
== 2.4.6
CVE-2002-0429
Low
Aug 12, 2002
== 2.4.18
CVE-2002-0499
Low
Aug 12, 2002
== 2.4.15
== 2.2.10
== 2.4.11
== 2.2.13
== 2.2.0
== 2.2.6
== 2.4.12
== 2.4.13
== 2.2.18
== 2.2.3
== 2.4.17
== 2.2.2
== 2.3.0
== 2.2.5
== 2.4.7
== 2.3.99
== 2.2.8
== 2.4.9
== 2.2.7
== 2.2.16
== 2.2.1
== 2.2.12
== 2.4.10
== 2.4.0
== 2.4.2
== 2.4.16
== 2.4.8
== 2.4.14
== 2.2.19
== 2.2.20
== 2.4.5
== 2.2.15
== 2.4.18
== 2.2.4
== 2.4.3
== 2.2.14
== 2.2.11
== 2.4.1
== 2.4.4
== 2.2.17
== 2.4.6
== 2.2.9
CVE-2002-0510
Medium
Aug 12, 2002
== 2.4.15
== 2.4.11
== 2.4.12
== 2.4.13
== 2.4.17
== 2.4.7
== 2.4.9
== 2.4.10
== 2.4.0
== 2.4.2
== 2.4.16
== 2.4.8
== 2.4.14
== 2.4.5
== 2.4.18
== 2.4.3
== 2.4.1
== 2.4.4
== 2.4.6
CVE-2002-0704
High
Jul 26, 2002
== 2.4.19-pre1
== 2.4.19-pre4
== 2.4.19-pre6
== 2.4.19-pre2
== 2.4.19-pre3
== 2.4.19-pre5
>= 2.4.4 <= 2.4.18
‹
›
‹
1
2
...
1123
1124
1125
...
1131
1132
›