Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,214
With exploit
gnu / gnutls
You can search for specific versions with
https://synscan.net/product/gnutls/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2014-0092
Medium
Mar 7, 2014
== 3.2.3
== 3.2.0
== 3.2.1
== 3.2.8
== 3.2.4
== 3.2.9
== 3.2.6
== 3.2.10
<= 3.2.11
== 3.2.7
== 3.2.2
== 3.2.5
== 3.2.8.1
== 3.1.0
== 3.1.11
== 3.1.13
== 3.1.20
== 3.1.19
== 3.1.18
== 3.1.5
<= 3.1.21
== 3.1.15
== 3.1.4
== 3.1.8
== 3.1.16
== 3.1.1
== 3.1.17
== 3.1.12
== 3.1.10
== 3.1.7
== 3.1.2
== 3.1.14
== 3.1.3
== 3.1.6
== 3.1.9
CVE-2013-4466
Medium
Nov 20, 2013
== 3.1.0
== 3.1.11
== 3.1.13
== 3.2.3
== 3.2.0
== 3.1.5
== 3.2.1
== 3.1.4
== 3.1.8
== 3.1.1
== 3.1.12
== 3.1.10
== 3.1.7
== 3.1.2
== 3.1.14
== 3.2.4
== 3.1.3
== 3.1.6
== 3.2.2
== 3.1.9
CVE-2013-4487
Medium
Nov 20, 2013
== 3.2.3
== 3.2.0
== 3.2.1
== 3.2.4
== 3.2.2
== 3.2.5
== 3.1.0
== 3.1.11
== 3.1.13
== 3.1.5
== 3.1.15
== 3.1.4
== 3.1.8
== 3.1.1
== 3.1.12
== 3.1.10
== 3.1.7
== 3.1.2
== 3.1.14
== 3.1.3
== 3.1.6
== 3.1.9
CVE-2013-2116
Medium
Jul 3, 2013
== 2.12.23
CVE-2013-1619
Low
Feb 8, 2013
== 2.12.15
== 2.3.5
== 2.10.2
== 2.0.0
== 2.8.3
== 2.3.4
== 2.12.2
== 2.7.4
== 2.6.1
== 2.2.4
== 2.12.22
== 2.1.0
== 2.3.1
== 2.12.7
== 2.12.5
== 2.2.5
== 2.1.1
== 2.3.8
== 2.8.5
== 2.12.16
== 2.1.7
== 2.10.4
== 2.1.4
== 2.6.0
== 2.1.6
== 2.8.0
== 2.12.14
== 2.12.8
== 2.4.3
== 2.3.2
== 2.3.9
== 2.2.2
== 2.2.0
== 2.3.11
== 2.5.0
== 2.6.2
== 2.12.21
== 2.10.1
== 2.12.6.1
== 2.12.0
== 2.12.20
== 2.12.10
== 2.0.4
== 2.6.3
== 2.6.6
== 2.12.6
== 2.10.3
== 2.4.0
== 2.1.3
== 2.8.6
== 2.4.1
== 2.12.9
== 2.3.7
== 2.0.3
== 2.10.5
== 2.12.19
== 2.6.5
== 2.8.2
== 2.12.13
== 2.1.2
== 2.4.2
== 2.6.4
== 2.3.6
== 2.3.3
== 2.1.8
== 2.0.1
== 2.12.12
== 2.12.3
== 2.12.4
== 2.2.1
== 2.1.5
== 2.8.1
== 2.12.11
== 2.12.1
== 2.12.17
== 2.10.0
== 2.3.10
== 2.0.2
== 2.3.0
== 2.2.3
== 2.8.4
== 2.12.18
== 3.0.12
== 3.0.23
== 3.0.27
== 3.0.3
== 3.0.9
== 3.0.21
== 3.0.6
== 3.0.8
== 3.0.26
== 3.0.17
== 3.0.16
== 3.0.19
== 3.0.20
== 3.0
== 3.0.0
== 3.0.11
== 3.0.18
== 3.0.7
== 3.0.2
== 3.0.13
== 3.0.5
== 3.0.14
== 3.0.15
== 3.0.10
== 3.0.1
== 3.0.25
== 3.0.4
== 3.0.24
== 3.0.22
== 3.1.0
== 3.1.5
== 3.1.4
== 3.1.1
== 3.1.2
== 3.1.3
== 3.1.6
CVE-2012-1569
Medium
Mar 26, 2012
== 2.3.5
== 1.6.0
== 2.10.2
== 3.0.12
== 2.0.0
== 1.5.0
== 1.2.8
== 2.8.3
== 1.1.14
== 2.3.4
== 1.7.3
== 3.0.3
== 2.12.2
== 2.7.4
== 3.0.9
== 1.4.1
== 1.4.3
== 2.6.1
== 1.2.11
== 3.0.6
== 1.1.21
== 1.7.5
== 1.7.11
== 1.0.20
<= 3.0.15
== 1.2.5
== 2.2.4
== 1.0.17
== 3.0.8
== 1.2.4
== 1.3.1
== 1.0.24
== 1.7.15
== 1.6.1
== 1.0.21
== 1.4.2
== 1.7.8
== 1.7.0
== 2.1.0
== 2.3.1
== 2.12.7
== 1.0.16
== 2.12.5
== 2.2.5
== 2.1.1
== 2.3.8
== 1.7.18
== 2.8.5
== 1.1.20
== 2.1.7
== 2.10.4
== 2.1.4
== 1.2.10
== 1.5.3
== 1.1.22
== 1.6.3
== 2.6.0
== 2.1.6
== 2.8.0
== 1.4.5
== 2.12.14
== 1.5.1
== 3.0
== 2.12.8
== 3.0.0
== 1.4.0
== 2.4.3
== 1.7.4
== 1.7.13
== 2.3.2
== 2.3.9
== 2.2.2
== 2.2.0
== 2.3.11
== 1.3.4
== 2.5.0
== 2.6.2
== 2.10.1
== 2.12.6.1
== 1.0.19
== 1.7.2
== 1.2.1
== 2.12.0
== 1.1.19
== 2.12.10
== 2.0.4
== 2.6.3
== 2.6.6
== 3.0.11
== 2.12.6
== 2.10.3
== 1.1.18
== 1.5.4
== 1.7.9
== 2.4.0
== 2.1.3
== 2.8.6
== 2.4.1
== 1.7.10
== 1.1.13
== 2.12.9
== 1.2.8.1a1
== 2.3.7
== 2.0.3
== 1.2.2
== 1.7.19
== 3.0.7
== 2.10.5
== 1.5.5
== 1.2.0
== 1.0.18
== 3.0.2
== 1.2.7
== 2.6.5
== 2.8.2
== 2.12.13
== 1.3.2
== 1.0.25
== 1.1.15
== 2.1.2
== 1.0.23
== 2.4.2
== 1.3.0
== 3.0.13
== 3.0.5
== 1.3.5
== 1.7.14
== 3.0.14
== 1.1.23
== 1.2.3
== 2.6.4
== 1.2.6
== 2.3.6
== 1.2.9
== 1.7.17
== 2.3.3
== 2.1.8
== 1.7.7
== 2.0.1
== 1.7.6
== 2.12.12
== 2.12.3
== 2.12.4
== 3.0.10
== 2.2.1
== 2.1.5
== 1.7.1
== 2.8.1
== 2.12.11
== 1.5.2
== 2.12.1
== 1.7.16
== 3.0.1
== 1.7.12
== 2.10.0
== 1.1.16
== 2.3.10
== 1.0.22
== 3.0.4
== 2.0.2
== 2.3.0
== 1.6.2
== 2.2.3
== 2.8.4
== 1.4.4
== 1.1.17
== 1.3.3
CVE-2012-1573
Medium
Mar 26, 2012
== 2.12.15
== 2.3.5
== 2.10.2
== 2.0.0
== 2.8.3
== 2.3.4
== 2.12.2
== 2.7.4
== 2.6.1
== 2.2.4
== 2.1.0
== 2.3.1
== 2.12.7
== 2.12.5
== 2.2.5
== 2.1.1
== 2.3.8
== 2.8.5
== 2.1.7
== 2.10.4
== 2.1.4
== 2.6.0
== 2.1.6
== 2.8.0
== 2.12.14
== 2.12.8
== 2.4.3
== 2.3.2
== 2.3.9
== 2.2.2
== 2.2.0
== 2.3.11
== 2.5.0
== 2.6.2
== 2.10.1
== 2.12.6.1
== 2.12.0
== 2.12.10
== 2.0.4
== 2.6.3
== 2.6.6
== 2.12.6
== 2.10.3
== 2.4.0
== 2.1.3
== 2.8.6
== 2.4.1
== 2.12.9
== 2.3.7
== 2.0.3
== 2.10.5
== 2.6.5
== 2.8.2
== 2.12.13
== 2.1.2
== 2.4.2
== 2.6.4
== 2.3.6
== 2.3.3
== 2.1.8
== 2.0.1
== 2.12.12
== 2.12.3
== 2.12.4
<= 2.12.16
== 2.2.1
== 2.1.5
== 2.8.1
== 2.12.11
== 2.12.1
== 2.10.0
== 2.3.10
== 2.0.2
== 2.3.0
== 2.2.3
== 2.8.4
== 3.0.12
== 3.0.3
== 3.0.9
== 3.0.6
== 3.0.8
== 3.0
== 3.0.0
== 3.0.11
== 3.0.7
== 3.0.2
== 3.0.13
== 3.0.5
== 3.0.14
== 3.0.10
== 3.0.1
== 3.0.4
CVE-2012-1663
High
Mar 13, 2012
== 2.3.5
== 1.6.0
== 2.10.2
== 3.0.12
== 2.0.0
== 1.5.0
== 1.2.8
== 2.8.3
== 1.1.14
== 2.3.4
== 1.7.3
== 3.0.3
== 2.12.2
== 2.7.4
== 3.0.9
== 1.4.1
== 1.4.3
== 2.6.1
== 1.2.11
== 3.0.6
== 1.1.21
== 1.7.5
== 1.7.11
== 1.0.20
== 1.2.5
== 2.2.4
== 1.0.17
== 3.0.8
== 1.2.4
== 1.3.1
== 1.0.24
== 1.7.15
== 1.6.1
== 1.0.21
== 1.4.2
== 1.7.8
== 1.7.0
== 2.1.0
== 2.3.1
== 2.12.7
== 1.0.16
== 2.12.5
== 2.2.5
== 2.1.1
== 2.3.8
== 1.7.18
== 2.8.5
== 1.1.20
== 2.1.7
== 2.10.4
== 2.1.4
== 1.2.10
== 1.5.3
== 1.1.22
== 1.6.3
== 2.6.0
== 2.1.6
== 2.8.0
== 1.4.5
== 2.12.14
== 1.5.1
== 3.0
== 2.12.8
== 3.0.0
== 1.4.0
== 2.4.3
== 1.7.4
== 1.7.13
== 2.3.2
== 2.3.9
== 2.2.2
== 2.2.0
== 2.3.11
== 1.3.4
== 2.5.0
== 2.6.2
== 2.10.1
== 2.12.6.1
== 1.0.19
== 1.7.2
== 1.2.1
== 2.12.0
== 1.1.19
== 2.12.10
== 2.0.4
== 2.6.3
== 2.6.6
== 3.0.11
== 2.12.6
== 2.10.3
== 1.1.18
== 1.5.4
== 1.7.9
== 2.4.0
== 2.1.3
== 2.8.6
== 2.4.1
== 1.7.10
== 1.1.13
== 2.12.9
== 1.2.8.1a1
== 2.3.7
== 2.0.3
== 1.2.2
== 1.7.19
== 3.0.7
== 2.10.5
== 1.5.5
== 1.2.0
== 1.0.18
== 3.0.2
== 1.2.7
== 2.6.5
== 2.8.2
== 2.12.13
== 1.3.2
== 1.0.25
== 1.1.15
== 2.1.2
== 1.0.23
== 2.4.2
== 1.3.0
== 3.0.5
== 1.3.5
== 1.7.14
== 1.1.23
== 1.2.3
== 2.6.4
== 1.2.6
== 2.3.6
== 1.2.9
== 1.7.17
== 2.3.3
== 2.1.8
== 1.7.7
== 2.0.1
== 1.7.6
== 2.12.12
== 2.12.3
== 2.12.4
== 3.0.10
== 2.2.1
== 2.1.5
== 1.7.1
== 2.8.1
== 2.12.11
== 1.5.2
== 2.12.1
== 1.7.16
== 3.0.1
== 1.7.12
== 2.10.0
== 1.1.16
== 2.3.10
== 1.0.22
== 3.0.4
== 2.0.2
== 2.3.0
== 1.6.2
== 2.2.3
== 2.8.4
== 1.4.4
== 1.1.17
== 1.3.3
<= 3.0.13
CVE-2012-0390
Low
Jan 6, 2012
== 2.10.2
== 2.8.3
== 3.0.3
== 2.12.2
== 3.0.9
== 2.6.1
== 3.0.6
== 2.2.4
== 3.0.8
== 2.12.7
== 2.12.5
== 2.2.5
== 2.8.5
== 2.10.5-x86
== 2.10.4
== 2.6.0
== 2.8.0
== 2.12.14
== 2.12.8
== 3.0.0
== 2.4.3
== 2.6.2
== 2.10.1
== 2.12.6.1
== 2.12.0
== 2.12.10
== 2.6.3
== 2.6.6
== 2.12.6
== 2.10.3
== 2.4.0
== 2.8.6
== 2.4.1
== 2.12.9
<= 3.0.10
== 3.0.7
== 2.10.5
== 3.0.2
== 2.6.5
== 2.8.2
== 2.12.13
== 2.10.1-x86
== 2.4.2
== 2.10.2-x86
== 3.0.5
== 2.6.4
== 2.12.12
== 2.12.3
== 2.12.4
== 2.8.1
== 2.12.11
== 2.12.1
== 3.0.1
== 2.10.0
== 3.0.4
== 2.8.4
CVE-2011-4128
Low
Dec 8, 2011
== 2.12.2
== 2.12.7
== 2.12.5
== 2.12.8
== 2.12.6.1
== 2.12.0
== 2.12.10
== 2.12.6
== 2.12.9
== 2.12.13
== 2.12.12
== 2.12.3
== 2.12.4
== 2.12.11
== 2.12.1
== 3.0.3
== 3.0.6
== 3.0.0
== 3.0.2
== 3.0.5
== 3.0.1
== 3.0.4
‹
›
‹
1
2
3
4
5
6
7
›