Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,445
With exploit
postgresql / postgresql
You can search for specific versions with
https://synscan.net/product/postgresql/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-2655
Low
Jul 18, 2012
== 8.3.6
== 8.3.17
== 8.3.3
== 8.3.2
== 8.3.12
== 8.3.18
== 8.3.14
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.16
== 8.3.4
== 8.3.11
== 8.3.9
== 8.3.13
== 8.3.15
== 8.4.8
== 8.4.4
== 8.4.1
== 8.4.9
== 8.4.3
== 8.4.10
== 8.4.11
== 8.4.6
== 8.4
== 8.4.5
== 8.4.7
== 8.4.2
== 9.0.7
== 9.0.6
== 9.0.4
== 9.0.1
== 9.0.3
== 9.0
== 9.0.2
== 9.0.5
== 9.1
== 9.1.2
== 9.1.3
== 9.1.1
CVE-2012-2143
Low
Jul 5, 2012
>= 8.3 < 8.3.19
>= 8.4 < 8.4.12
>= 9.0 < 9.0.8
>= 9.1 < 9.1.4
CVE-2011-2483
Medium
Aug 25, 2011
>= 8.2.0 < 8.2.22
>= 8.3.0 < 8.3.16
>= 8.4.0 < 8.4.9
>= 9.0.0 < 9.0.5
CVE-2010-4015
Medium
Feb 2, 2011
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.12
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.11
== 8.3.9
== 8.3.13
== 9.0.1
== 9.0
== 9.0.2
== 8.4.4
== 8.4.1
== 8.4.3
== 8.4.6
== 8.4
== 8.4.5
== 8.4.2
== 8.2.9
== 8.2.17
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.19
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.18
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
CVE-2010-3433
Medium
Oct 6, 2010
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.29
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.25
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.21
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.17
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.11
== 8.3.9
== 8.4.4
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0
CVE-2010-1170
Medium
May 19, 2010
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
CVE-2010-1447
High
May 19, 2010
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
CVE-2010-1975
Medium
May 19, 2010
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
CVE-2010-1169
High
May 19, 2010
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
CVE-2010-0733
Low
Mar 19, 2010
== 8.1.10
== 8.1.6
== 8.2.9
== 8.0.7
== 8.0.2
== 8.1.15
== 8.1.7
== 8.3.6
== 8.2.10
== 8.0.22
== 8.2.15
== 8.2.4
== 8.0.17
== 8.0.10
== 8.1.20
== 8.1
== 8.1.19
== 8.2.11
== 8.1.13
== 8.0.12
== 8.2.12
== 8.0.9
== 8.0.15
== 8.2.2
== 8.3.3
== 8.0.0
== 8.1.0
== 8.1.3
== 8.3.2
== 8.5
== 8.0.18
== 8.2.5
== 8.0.3
== 8.1.9
== 8.4
<= 8.4.1
== 8.2.1
== 8.3.1
== 8.5-alpha2
== 8.1.14
== 8.3.5
== 8.0.20
== 8.3.8
== 8.0.8
== 8.2.7
== 8.0.6
== 8.1.11
== 8.2.6
== 8.0.16
== 8.3.7
== 8.1.17
== 8.0.13
== 8.3.10
== 8.1.18
== 8.3
== 8.1.4
== 8.0.1
== 8.1.8
== 8.3.4
== 8.0.19
== 8.1.1
== 8.1.12
== 8.1.5
== 8.0.21
== 8.1.16
== 8.2.3
== 8.0.23
== 8.5-alpha1
== 8.3.9
== 8.2.16
== 8.0.4
== 8.0.5
== 8.0.14
== 8.2.8
== 8.2.13
== 8.2
== 8.0.11
== 8.0.317
== 8.0
== 8.2.14
== 8.1.2
‹
›
‹
1
2
...
10
11
12
...
15
16
›