Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,444
With exploit
sun / jdk
You can search for specific versions with
https://synscan.net/product/jdk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-5812
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5814
High
Oct 16, 2013
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_21
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
CVE-2013-5817
High
Oct 16, 2013
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_21
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
CVE-2013-5818
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5819
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5820
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5823
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5824
High
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
CVE-2013-5825
Medium
Oct 16, 2013
== 1.6.0-update_4
== 1.6.0-update_7
== 1.6.0-update_19
== 1.6.0-update_13
== 1.6.0-update_3
== 1.6.0-update_11
== 1.6.0-update_10
== 1.6.0-update_14
== 1.6.0
== 1.6.0-update_17
== 1.6.0-update_5
== 1.6.0-update2
== 1.6.0-update1_b06
== 1.6.0-update_21
== 1.6.0-update_16
== 1.6.0-update1
== 1.6.0-update_15
== 1.6.0-update_12
== 1.6.0-update_18
== 1.6.0-update_6
== 1.6.0-update_20
== 1.5.0-update20
== 1.5.0-update15
== 1.5.0-update18
== 1.5.0-update27
== 1.5.0-update3
== 1.5.0-update21
== 1.5.0-update31
== 1.5.0-update11
== 1.5.0-update26
== 1.5.0-update16
== 1.5.0-update17
== 1.5.0-update9
== 1.5.0-update22
== 1.5.0-update29
== 1.5.0-update28
== 1.5.0-update6
== 1.5.0-update14
== 1.5.0-update23
== 1.5.0-update33
== 1.5.0-update11_b03
== 1.5.0-update1
== 1.5.0-update4
== 1.5.0-update7
== 1.5.0
== 1.5.0-update12
== 1.5.0-update5
== 1.5.0-update24
== 1.5.0-update25
== 1.5.0-update7_b03
== 1.5.0-update2
== 1.5.0-update19
== 1.5.0-update13
== 1.5.0-update8
== 1.5.0-update10
CVE-2013-5831
Medium
Oct 16, 2013
== 1.6.0
== 1.6.0-update_10
== 1.6.0-update_11
== 1.6.0-update_12
== 1.6.0-update_13
== 1.6.0-update_14
== 1.6.0-update_15
== 1.6.0-update_16
== 1.6.0-update_17
== 1.6.0-update_18
== 1.6.0-update_19
== 1.6.0-update_20
== 1.6.0-update_21
== 1.6.0-update_3
== 1.6.0-update_4
== 1.6.0-update_5
== 1.6.0-update_6
== 1.6.0-update_7
== 1.6.0-update1
== 1.6.0-update1_b06
== 1.6.0-update2
‹
›
‹
1
2
3
4
5
6
...
39
40
›
oracle / jdk
You can search for specific versions with
https://synscan.net/product/jdk/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2025-30698
Medium
Apr 15, 2025
== 1.8.0-update441
== 11.0.26
== 17.0.14
== 21.0.6
== 24
CVE-2025-30691
Low
Apr 15, 2025
== 21.0.6
== 24
CVE-2025-21587
High
Apr 15, 2025
== 1.8.0-update441
== 11.0.26
== 17.0.14
== 21.0.6
== 24
CVE-2025-21502
Unknown
Jan 21, 2025
== 1.8.0-update431
== 11.0.25
== 17.0.13
== 21.0.5
== 23.0.1
CVE-2024-21211
Unknown
Oct 15, 2024
== 23
CVE-2024-21235
Low
Oct 15, 2024
== 1.8.0-update421
== 11.0.24
== 17.0.12
== 21.0.4
== 23
CVE-2024-21217
Low
Oct 15, 2024
== 1.8.0-update421
== 11.0.24
== 17.0.12
== 21.0.4
== 23
CVE-2024-21210
Low
Oct 15, 2024
== 1.8.0-update421
== 11.0.24
== 17.0.12
== 21.0.4
== 23
CVE-2024-21208
Low
Oct 15, 2024
== 1.8.0-update421
== 11.0.24
== 17.0.12
== 21.0.4
== 23
CVE-2024-21131
Low
Jul 17, 2024
== 1.8.0-update411
== 11.0.23
== 17.0.11
== 21.0.3
== 22.0.1
‹
›
‹
1
2
3
4
5
6
...
77
78
›