Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
easy_software_products / cups
You can search for specific versions with
https://synscan.net/product/cups/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2002-1383
High
Dec 26, 2002
== 1.0.4
== 1.0.4_8
== 1.1.1
== 1.1.10
== 1.1.13
== 1.1.14
== 1.1.17
== 1.1.4
== 1.1.4_2
== 1.1.4_3
== 1.1.4_5
== 1.1.6
== 1.1.7
CVE-2002-0063
High
Mar 8, 2002
<= 1.1.14
CVE-2001-1332
High
May 10, 2001
<= 1.1.5
CVE-2001-1333
Low
May 10, 2001
<= 1.1.5
CVE-2001-0194
High
May 3, 2001
<= 1.1.4
‹
›
‹
1
2
3
4
›
apple / cups
You can search for specific versions with
https://synscan.net/product/cups/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2009-0163
Medium
Apr 23, 2009
== 1.1.20
== 1.1.5-2
== 1.1.14
== 1.3-rc2
== 1.1.6-1
== 1.1.18
== 1.1.12
== 1.1.5-1
== 1.3.3
== 1.1.22
== 1.2.0
== 1.1.16
== 1.3.1
== 1.1.23-rc1
== 1.1.20-rc1
== 1.1.15
== 1.1.17
== 1.1.20-rc6
== 1.2.4
== 1.1.19-rc1
== 1.3.2
== 1.1.22-rc1
== 1.1.7
== 1.2-rc2
== 1.1.6-2
== 1.3-b1
== 1.1.3
== 1.2.3
== 1.1.21
== 1.2.9
== 1.2.10
== 1.1.4
== 1.1.23
== 1.2.6
== 1.2-b1
== 1.3.8
== 1.1.20-rc4
== 1.1.19
== 1.1
== 1.3.4
== 1.1.8
== 1.1.5
== 1.2.1
== 1.2-rc3
== 1.1.2
== 1.1.13
== 1.1.19-rc4
== 1.1.9-1
== 1.2.12
== 1.1.21-rc2
== 1.2-b2
== 1.2.7
== 1.1.6-3
== 1.1.20-rc5
== 1.1.9
== 1.3.7
== 1.1.19-rc5
== 1.2-rc1
<= 1.3.9
== 1.1.1
== 1.2.8
== 1.2.2
== 1.1.10
== 1.2.11
== 1.1.22-rc2
== 1.1.21-rc1
== 1.3-rc1
== 1.1.11
== 1.1.19-rc3
== 1.1.6
== 1.1.10-1
== 1.3.0
== 1.3.5
== 1.3.6
== 1.1.20-rc2
== 1.1.20-rc3
== 1.2.5
== 1.1.19-rc2
CVE-2009-0166
Low
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-0195
Medium
Apr 23, 2009
== 1.3.9
CVE-2009-0799
Low
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-0800
Medium
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-1179
Medium
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-1180
Medium
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-1181
Low
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-1182
High
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
CVE-2009-1183
Low
Apr 23, 2009
<= 1.3.9
== 1.1
== 1.1.1
== 1.1.10
== 1.1.10-1
== 1.1.11
== 1.1.12
== 1.1.13
== 1.1.14
== 1.1.15
== 1.1.16
== 1.1.17
== 1.1.18
== 1.1.19
== 1.1.19-rc1
== 1.1.19-rc2
== 1.1.19-rc3
== 1.1.19-rc4
== 1.1.19-rc5
== 1.1.2
== 1.1.20
== 1.1.20-rc1
== 1.1.20-rc2
== 1.1.20-rc3
== 1.1.20-rc4
== 1.1.20-rc5
== 1.1.20-rc6
== 1.1.21
== 1.1.21-rc1
== 1.1.21-rc2
== 1.1.22
== 1.1.22-rc1
== 1.1.22-rc2
== 1.1.23
== 1.1.23-rc1
== 1.1.3
== 1.1.4
== 1.1.5
== 1.1.5-1
== 1.1.5-2
== 1.1.6
== 1.1.6-1
== 1.1.6-2
== 1.1.6-3
== 1.1.7
== 1.1.8
== 1.1.9
== 1.1.9-1
== 1.2.0
== 1.2.1
== 1.2.10
== 1.2.11
== 1.2.12
== 1.2.2
== 1.2.3
== 1.2.4
== 1.2.5
== 1.2.6
== 1.2.7
== 1.2.8
== 1.2.9
== 1.3.0
== 1.3.1
== 1.3.10
== 1.3.11
== 1.3.2
== 1.3.3
== 1.3.4
== 1.3.5
== 1.3.6
== 1.3.7
== 1.3.8
‹
›
‹
1
2
3
4
5
6
›