Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,445
With exploit
sun / jdk
You can search for specific versions with
https://synscan.net/product/jdk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-5083
High
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.4.2_13
== 1.4.2_30
== 1.4.2_12
== 1.4.2_31
== 1.4.2_3
== 1.4.2_26
== 1.4.2_19
== 1.4.2_8
== 1.4.2_29
== 1.4.2_16
== 1.4.2_6
== 1.4.2_23
== 1.4.2_18
== 1.4.2_32
== 1.4.2_22
== 1.4.2_36
== 1.4.2_17
== 1.4.2_4
== 1.4.2_25
== 1.4.2_11
== 1.4.2_14
== 1.4.2
== 1.4.2_28
== 1.4.2_33
== 1.4.2_35
== 1.4.2_5
== 1.4.2_2
== 1.4.2_1
== 1.4.2_34
== 1.4.2_9
== 1.4.2_10
== 1.4.2_37
== 1.4.2_27
== 1.4.2_7
== 1.4.2_15
CVE-2012-5084
High
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.4.2_13
== 1.4.2_30
== 1.4.2_12
== 1.4.2_31
== 1.4.2_3
== 1.4.2_26
== 1.4.2_19
== 1.4.2_8
== 1.4.2_29
== 1.4.2_16
== 1.4.2_6
== 1.4.2_23
== 1.4.2_18
== 1.4.2_32
== 1.4.2_22
== 1.4.2_36
== 1.4.2_17
== 1.4.2_4
== 1.4.2_25
== 1.4.2_11
== 1.4.2_14
== 1.4.2
== 1.4.2_28
== 1.4.2_33
== 1.4.2_35
== 1.4.2_5
== 1.4.2_2
== 1.4.2_1
== 1.4.2_34
== 1.4.2_9
== 1.4.2_10
== 1.4.2_37
== 1.4.2_27
== 1.4.2_7
== 1.4.2_15
CVE-2012-5085
Low
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.4.2_13
== 1.4.2_30
== 1.4.2_12
== 1.4.2_31
== 1.4.2_3
== 1.4.2_26
== 1.4.2_19
== 1.4.2_8
== 1.4.2_29
== 1.4.2_16
== 1.4.2_6
== 1.4.2_23
== 1.4.2_18
== 1.4.2_32
== 1.4.2_22
== 1.4.2_36
== 1.4.2_17
== 1.4.2_4
== 1.4.2_25
== 1.4.2_11
== 1.4.2_14
== 1.4.2
== 1.4.2_28
== 1.4.2_33
== 1.4.2_35
== 1.4.2_5
== 1.4.2_2
== 1.4.2_1
== 1.4.2_34
== 1.4.2_9
== 1.4.2_10
== 1.4.2_37
== 1.4.2_27
== 1.4.2_7
== 1.4.2_15
CVE-2012-5086
High
Oct 16, 2012
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
== 1.6.0.200-update20
== 1.6.0.210-update21
CVE-2012-5089
High
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.4.2_13
== 1.4.2_30
== 1.4.2_12
== 1.4.2_31
== 1.4.2_3
== 1.4.2_26
== 1.4.2_19
== 1.4.2_8
== 1.4.2_29
== 1.4.2_16
== 1.4.2_6
== 1.4.2_23
== 1.4.2_18
== 1.4.2_32
== 1.4.2_22
== 1.4.2_36
== 1.4.2_17
== 1.4.2_4
== 1.4.2_25
== 1.4.2_11
== 1.4.2_14
== 1.4.2
== 1.4.2_28
== 1.4.2_33
== 1.4.2_35
== 1.4.2_5
== 1.4.2_2
== 1.4.2_1
== 1.4.2_34
== 1.4.2_9
== 1.4.2_10
== 1.4.2_37
== 1.4.2_27
== 1.4.2_7
== 1.4.2_15
CVE-2012-1531
High
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.4.2_13
== 1.4.2_30
== 1.4.2_12
== 1.4.2_31
== 1.4.2_3
== 1.4.2_26
== 1.4.2_19
== 1.4.2_8
== 1.4.2_29
== 1.4.2_16
== 1.4.2_6
== 1.4.2_23
== 1.4.2_18
== 1.4.2_32
== 1.4.2_22
== 1.4.2_36
== 1.4.2_17
== 1.4.2_4
== 1.4.2_25
== 1.4.2_11
== 1.4.2_14
== 1.4.2
== 1.4.2_28
== 1.4.2_33
== 1.4.2_35
== 1.4.2_5
== 1.4.2_2
== 1.4.2_1
== 1.4.2_34
== 1.4.2_9
== 1.4.2_10
== 1.4.2_37
== 1.4.2_27
== 1.4.2_7
== 1.4.2_15
CVE-2012-1532
High
Oct 16, 2012
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
== 1.6.0.200-update20
== 1.6.0.210-update21
CVE-2012-1533
High
Oct 16, 2012
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
== 1.6.0.200-update20
== 1.6.0.210-update21
CVE-2012-3143
High
Oct 16, 2012
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0-update_17
== 1.6.0.200-update20
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0.210-update21
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
CVE-2012-3159
High
Oct 16, 2012
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
== 1.6.0.200-update20
== 1.6.0.210-update21
‹
›
‹
1
2
...
13
14
15
...
39
40
›
oracle / jdk
You can search for specific versions with
https://synscan.net/product/jdk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2020-2778
Low
Apr 15, 2020
== 11.0.6
== 14.0.0
CVE-2020-2754
Low
Apr 15, 2020
== 1.8.0-update241
== 11.0.6
== 14.0.0
CVE-2020-2755
Low
Apr 15, 2020
== 1.8.0-update241
== 11.0.6
== 14.0.0
CVE-2020-2756
Low
Apr 15, 2020
== 1.7.0-update251
== 1.8.0-update241
== 11.0.6
== 14.0.0
CVE-2020-2757
Low
Apr 15, 2020
== 1.7.0-update251
== 1.8.0-update241
== 11.0.6
== 14.0.0
CVE-2020-2654
Low
Jan 15, 2020
== 1.7.0-update241
== 1.8.0-update231
== 11.0.5
== 13.0.1
CVE-2020-2655
Low
Jan 15, 2020
== 11.0.5
== 13.0.1
CVE-2020-2659
Low
Jan 15, 2020
== 1.7.0-update241
== 1.8.0-update231
CVE-2020-2601
Medium
Jan 15, 2020
== 1.7.0-update241
== 1.8.0-update231
== 11.0.5
== 13.0.1
CVE-2020-2604
High
Jan 15, 2020
== 1.7.0-update241
== 1.8.0-update231
== 11.0.5
== 13.0.1
‹
›
‹
1
2
...
13
14
15
...
77
78
›