Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 310,222
With exploit
google / chrome
You can search for specific versions with
https://synscan.net/product/chrome/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-2849
Low
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2850
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2851
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2852
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2853
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2854
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2855
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2856
High
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
CVE-2012-2857
Medium
Aug 6, 2012
<= 21.0.1180.59
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
== 21.0.1180.56
== 21.0.1180.57
<= 21.0.1180.56
CVE-2012-2858
Medium
Aug 6, 2012
<= 21.0.1180.56
== 21.0.1180.0
== 21.0.1180.1
== 21.0.1180.2
== 21.0.1180.31
== 21.0.1180.32
== 21.0.1180.33
== 21.0.1180.34
== 21.0.1180.35
== 21.0.1180.36
== 21.0.1180.37
== 21.0.1180.38
== 21.0.1180.39
== 21.0.1180.41
== 21.0.1180.46
== 21.0.1180.47
== 21.0.1180.48
== 21.0.1180.49
== 21.0.1180.50
== 21.0.1180.51
== 21.0.1180.52
== 21.0.1180.53
== 21.0.1180.54
== 21.0.1180.55
<= 21.0.1180.59
== 21.0.1180.56
== 21.0.1180.57
‹
›
‹
1
2
...
312
313
314
...
374
375
›