Vulnerability Database

With exploit

linux / linux_kernel

Title Severity Exploit Date Affected Version
CVE-2011-3209 Low Oct 3, 2012 <= 2.6.25.20
CVE-2012-3375 Low Oct 3, 2012 == 3.2.21
== 3.0.25
== 3.1.2
== 3.2.19
== 3.0.22
== 3.0.5
== 3.2.18
== 3.2.5
== 3.0.18
== 3.0.6
== 3.0.11
== 3.0.34
== 3.0.32
== 3.2.16
== 3.0.19
== 3.0.4
== 3.0.27
== 3.2.11
== 3.0.23
== 3.2.10
== 3.0.8
== 3.2.14
== 3.0.33
== 3.0.28
== 3.2.4
== 3.0.13
== 3.2.9
== 3.0.10
== 3.2.15
== 3.0.1
== 3.1.6
== 3.2.20
== 3.2.6
== 3.2.2
== 3.0.17
== 3.1.3
== 3.1.9
== 3.0.16
== 3.2.13
== 3.0.21
== 3.0.7
== 3.1.5
== 3.1.8
== 3.2.1
== 3.2.7
== 3.0.20
== 3.0.24
== 3.0.15
== 3.0.2
<= 3.2.23
== 3.1.7
== 3.1.1
== 3.0.12
== 3.2.22
== 3.2.17
== 3.2.8
== 3.1.10
== 3.0.3
== 3.0.9
== 3.0.26
== 3.1.4
== 3.0.30
== 3.0.31
== 3.0.29
== 3.2.12
== 3.0.14
== 3.2.3
CVE-2012-3400 High Oct 3, 2012 < 3.0.37
>= 3.1 < 3.2.23
>= 3.4 < 3.4.5
CVE-2012-3412 High Oct 3, 2012 < 3.0.44
>= 3.1 < 3.2.30
>= 3.3 < 3.4.12
>= 3.5 < 3.5.5
CVE-2012-3430 Low Oct 3, 2012 == 3.0.25
== 3.0.22
== 3.0.5
== 3.0.38
== 3.0.18
== 3.0.6
== 3.0.36
== 3.0.35
== 3.0.11
== 3.0.34
== 3.0.32
== 3.0.19
== 3.0.37
== 3.0.4
== 3.0.27
== 3.0.42
== 3.0.23
== 3.0.8
== 3.0.40
== 3.0.33
== 3.0.28
== 3.0.13
== 3.0.10
== 3.0.1
== 3.0.17
<= 3.0.43
== 3.0.16
== 3.0.21
== 3.0.7
== 3.0.20
== 3.0.24
== 3.0.15
== 3.0.39
== 3.0.2
== 3.0.12
== 3.0.3
== 3.0.9
== 3.0.26
== 3.0.30
== 3.0.31
== 3.0.29
== 3.0.14
== 3.0.41
CVE-2012-3510 Medium Oct 3, 2012 == 2.6.11-rc3
== 2.6.17-rc6
== 2.6.18-rc3
== 2.6.11
== 2.6.16.16
== 2.6.18.7
== 2.6.17.12
== 2.6.16.39
== 2.6.16.9
== 2.6.12-rc1
== 2.6.12-rc4
== 2.6.17.9
== 2.6.14-rc2
== 2.6.11.2
== 2.6.15.3
== 2.6.11.10
== 2.6.10-rc3
== 2.6.13-rc5
== 2.6.16.43
== 2.6.16.6
== 2.6.16.8
== 2.6.16-rc6
== 2.6.14.7
== 2.6.18-rc2
== 2.6.16-rc1
== 2.6.13
== 2.6.17.2
== 2.6.15-rc4
== 2.6.13.3
== 2.6.11.8
== 2.6.18-rc5
== 2.6.16.34
== 2.6.18-rc4
== 2.6.17.8
== 2.6.14.4
== 2.6.14
== 2.6.17.4
== 2.6.16.18
== 2.6.17.14
== 2.6.10
== 2.6.13-rc1
== 2.6.16.45
== 2.6.14.3
== 2.6.13-rc6
== 2.6.18.3
== 2.6.16.37
== 2.6.11.6
== 2.6.16.48
== 2.6.11.11
== 2.6.16.13
== 2.6.13-rc7
== 2.6.16-rc7
== 2.6.16.4
== 2.6.17.3
== 2.6.16.15
== 2.6.13-rc2
== 2.6.15.6
== 2.6.15.1
== 2.6.11.5
== 2.6.15-rc5
== 2.6.18.4
== 2.6.16.1
== 2.6.18.1
== 2.6.14.5
== 2.6.13.2
== 2.6.12-rc5
== 2.6.17.5
== 2.6.14-rc3
== 2.6.18.5
== 2.6.16.32
== 2.6.13.5
== 2.6.16.57
== 2.6.16.49
== 2.6.17
== 2.6.12-rc2
== 2.6.11-rc4
== 2.6.16.11
== 2.6.16.14
== 2.6.15.10
== 2.6.16.25
== 2.6.15-rc3
== 2.6.16.21
== 2.6.16.33
== 2.6.16.28
== 2.6.17.10
== 2.6.15.11
== 2.6.14.1
== 2.6.16.23
== 2.6.16-rc5
== 2.6.12.5
== 2.6.15.7
== 2.6.16.3
== 2.6.17-rc3
== 2.6.12-rc3
== 2.6.15-rc2
== 2.6.16.36
== 2.6.14.6
== 2.6.12.1
== 2.6.11.9
== 2.6.10-rc2
== 2.6.16.46
== 2.6.17.1
== 2.6.16-rc4
== 2.6.16.54
== 2.6.13.4
== 2.6.17-rc1
== 2.6.17-rc2
== 2.6.12.2
== 2.6.16.31
== 2.6.16.26
== 2.6.11-rc1
== 2.6.16.62
== 2.6.18.2
== 2.6.16.29
== 2.6.14-rc1
== 2.6.16
== 2.6.16.51
== 2.6.15.2
== 2.6.15.9
== 2.6.16.22
== 2.6.16.58
== 2.6.16.40
== 2.6.15.8
== 2.6.10-rc1
== 2.6.16.47
== 2.6.16.42
== 2.6.17.11
== 2.6.16.10
== 2.6.12.4
== 2.6.16.41
== 2.6.16.52
== 2.6.11.3
== 2.6.16.24
== 2.6.16.55
== 2.6.12.3
== 2.6.13-rc4
== 2.6.11-rc2
== 2.6.16.30
== 2.6.15.4
== 2.6.16.59
== 2.6.16.38
== 2.6.16.17
== 2.6.16.12
== 2.6.16.27
== 2.6.16.53
== 2.6.18-rc7
== 2.6.12.6
== 2.6.17.7
<= 2.6.18.8
== 2.6.11.7
== 2.6.16.2
== 2.6.18.6
== 2.6.15
== 2.6.16.44
== 2.6.15-rc6
== 2.6.16.35
== 2.6.16.50
== 2.6.15-rc1
== 2.6.16-rc3
== 2.6.18-rc6
== 2.6.14.2
== 2.6.16.61
== 2.6.14-rc4
== 2.6.18
== 2.6.15-rc7
== 2.6.17.6
== 2.6.14-rc5
== 2.6.16.7
== 2.6.17.13
== 2.6.16.60
== 2.6.16.56
== 2.6.12-rc6
== 2.6.13-rc3
== 2.6.17-rc4
== 2.6.11-rc5
== 2.6.16.5
== 2.6.11.4
== 2.6.16.19
== 2.6.11.12
== 2.6.16.20
== 2.6.15.5
== 2.6.11.1
== 2.6.16-rc2
== 2.6.18-rc1
== 2.6.13.1
== 2.6.17-rc5
== 2.6.12
CVE-2012-3520 Low Oct 3, 2012 == 3.2.21
== 2.3.21
== 3.2.19
== 3.2.23
== 3.2.18
== 3.2.5
== 3.2.26
== 2.3.28
<= 3.2.29
== 2.3.26
== 3.2-rc2
== 3.2.16
== 3.2-rc5
== 3.3.2
== 3.2.27
== 2.4.33.2
== 2.3.27
== 3.2-rc4
== 2.6.13.2
== 3.2.11
== 2.3.24
== 2.6.33.2
== 3.2.10
== 3.2.14
== 3.2.25
== 3.2.4
== 2.3.29
== 2.3.2
== 3.2.9
== 3.2.15
== 3.2.20
== 3.2.24
== 2.6.33.20
== 3.2.6
== 2.3.23
== 3.2.2
== 2.3.22
== 3.2-rc3
== 3.2.13
== 3.2.1
== 3.2.7
== 2.6.23.2
== 2.3.20
== 3.2.22
== 2.3.25
== 3.2-rc6
== 3.2.17
== 3.2-rc7
== 3.2.8
== 3.2
== 3.2.12
== 3.2.28
== 3.2.3
CVE-2012-2136 High Aug 9, 2012 < 3.0.37
>= 3.1 < 3.2.23
>= 3.3 < 3.4.5
CVE-2011-4127 Low Jul 3, 2012 == 3.0.25
== 3.1.2
== 3.0-rc2
== 3.0.22
== 3.0.5
== 3.0-rc7
== 3.1-rc1
== 3.1-rc4
== 3.0.18
== 3.0.6
== 3.0-rc4
== 3.0.11
== 3.0.34
== 3.0.32
== 3.0.19
<= 3.2.1
== 3.0.4
== 3.0.27
== 3.0-rc6
== 3.0.23
== 3.0.8
== 3.1
== 3.0-rc3
== 3.0.33
== 3.0.28
== 3.0-rc1
== 3.0.13
== 3.0.10
== 3.0-rc5
== 3.1-rc2
== 3.0.1
== 3.1.6
== 3.0.17
== 3.1.3
== 3.1.9
== 3.0.16
== 3.0.21
== 3.0.7
== 3.1.5
== 3.1.8
== 3.0.20
== 3.0.24
== 3.0.15
== 3.0.2
== 3.1.7
== 3.1.1
== 3.0.12
== 3.1.10
== 3.2
== 3.0.3
== 3.0.9
== 3.0.26
== 3.1.4
== 3.0.30
== 3.0.31
== 3.0.29
== 3.0.14
== 3.1-rc3
CVE-2012-0045 Low Jul 3, 2012 == 3.0.25
== 3.1.2
== 3.0-rc2
== 3.0.22
== 3.0.5
== 3.0-rc7
== 3.1-rc1
== 3.1-rc4
== 3.2.5
== 3.0.18
== 3.0.6
== 3.0-rc4
== 3.0.11
== 3.0.34
== 3.0.32
== 3.0.19
== 3.0.4
== 3.0.27
== 3.0-rc6
== 3.2.11
== 3.0.23
== 3.2.10
== 3.0.8
== 3.1
== 3.0-rc3
== 3.0.33
== 3.0.28
== 3.0-rc1
== 3.2.4
== 3.0.13
== 3.2.9
== 3.0.10
== 3.0-rc5
== 3.1-rc2
== 3.0.1
== 3.1.6
== 3.2.6
== 3.2.2
== 3.0.17
== 3.1.3
== 3.1.9
== 3.0.16
== 3.0.21
== 3.0.7
== 3.1.5
== 3.1.8
== 3.2.1
== 3.2.7
== 3.0.20
== 3.0.24
== 3.0.15
== 3.0.2
== 3.1.7
== 3.1.1
== 3.0.12
<= 3.2.13
== 3.2.8
== 3.1.10
== 3.2
== 3.0.3
== 3.0.9
== 3.0.26
== 3.1.4
== 3.0.30
== 3.0.31
== 3.0.29
== 3.2.12
== 3.0.14
== 3.1-rc3
== 3.2.3