Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2008-4445
|
Low
|
|
Oct 6, 2008
|
== 2.6.25.4
== 2.6.25.11
== 2.6.18-rc3
== 2.6.25.9
== 2.6.22.15
== 2.6.24.7
== 2.6.18-rc2
== 2.6.23.13
== 2.6.24.2
== 2.4.36.6
== 2.6.18-rc5
== 2.6.18-rc4
== 2.6.22.21
== 2.6.25.12
== 2.6.25.5
== 2.6.23.8
== 2.6.25
== 2.6.22.12
== 2.6.25.8
== 2.6.21.6
== 2.4.36.2
== 2.6.23.16
== 2.6.24.1
== 2.6.25.6
== 2.6.22
== 2.6.20.16
== 2.6.19.4
== 2.6.25.13
== 2.6.20.21
== 2.6.25.7
== 2.4.36.1
== 2.6.25.3
== 2.6.24
<= 2.6.25.14
== 2.6.20.17
== 2.6.21.5
== 2.6.25.15
== 2.6.24_rc4
== 2.6.23.15
== 2.6.23.10
== 2.4.36.4
== 2.6.20.20
== 2.6.22.18
== 2.4.36.3
== 2.6.22.20
== 2.6.20.18
== 2.6.23.9
== 2.6.25.2
== 2.6.25.1
== 2.6.24.4
== 2.6.22.9
== 2.6.22.13
== 2.6.19.7
== 2.6.24.5
== 2.6.24_rc1
== 2.6.20.19
== 2.6.22.17
== 2.6.25.10
== 2.6.22.11
== 2.6.23
== 2.6.22.10
== 2.6.23.17
== 2.6.21.7
== 2.6.23_rc1
== 2.6.22.22
== 2.6.18-rc7
== 2.6.24.6
== 2.6.22_rc7
== 2.4.36
== 2.6.23.12
== 2.6.24_rc5
== 2.6.19.6
== 2.6.18-rc6
== 2.6.22.8
== 2.6.19.5
== 2.6.18
== 2.4.36.5
== 2.6.22.2
== 2.2.27
== 2.6.22.19
== 2.6.24.3
== 2.6.22_rc1
== 2.6.18-rc1
== 2.6.23.11
== 2.6.22.14
== 2.6
|
CVE-2008-4210
|
Low
|
|
Sep 29, 2008
|
== 2.6.18-rc3
== 2.6.18-rc2
== 2.4.36.6
== 2.6.18-rc5
== 2.6.18-rc4
== 2.6.21.6
== 2.4.36.2
== 2.6.20.16
== 2.6.19.4
== 2.6.20.21
== 2.4.36.1
== 2.6.20.17
== 2.6.21.5
== 2.4.36.4
== 2.6.20.20
== 2.4.36.3
== 2.6.20.18
== 2.6.19.7
== 2.6.20.19
== 2.6.18-rc7
== 2.4.36
== 2.6.19.6
== 2.6.18-rc6
== 2.6.19.5
== 2.6.18
== 2.4.36.5
== 2.2.27
<= 2.6.21.7
== 2.6.18-rc1
== 2.6
|
CVE-2008-4302
|
Medium
|
|
Sep 29, 2008
|
< 2.6.22.2
|
CVE-2008-3528
|
Low
|
|
Sep 27, 2008
|
== 2.6.26.5
|
CVE-2007-6716
|
Medium
|
|
Sep 4, 2008
|
< 2.6.23
|
CVE-2008-3911
|
High
|
|
Sep 4, 2008
|
== 2.6.26.3
|
CVE-2008-3792
|
High
|
|
Sep 3, 2008
|
== 2.6.26.3
|
CVE-2008-3686
|
Low
|
|
Aug 15, 2008
|
== 2.6.26-rc4
== 2.6.26.2
|
CVE-2008-3275
|
Medium
|
|
Aug 13, 2008
|
< 2.6.25.15
|
CVE-2008-3534
|
Low
|
|
Aug 8, 2008
|
< 2.6.26.1
|