Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,214
With exploit
python / python
You can search for specific versions with
https://synscan.net/product/python/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2015-1283
Medium
Jul 23, 2015
>= 3.3.0 < 3.3.7
>= 3.5.0 < 3.5.2
>= 3.4.0 < 3.4.5
>= 2.7.0 < 2.7.12
CVE-2014-9365
Medium
Dec 12, 2014
== 2.7.6
== 2.4.2
== 3.3.5
== 3.1
== 3.3.3-rc2
== 3.1.1
== 3.3.2
== 2.7.8
== 2.5.1
== 2.3.4
== 3.0
== 3.3.1-rc1
== 2.6.6
== 3.0.1
== 2.1
== 2.0.1
== 3.2.2
== 2.7.1150
== 3.3
== 2.6.1
== 2.3.1
== 3.2.5
== 2.1.2
== 3.1.5
== 3.2.2150
== 3.3.4-rc1
== 2.7.4
== 2.2.1
== 3.4.0
== 3.2.1
== 2.5.4
== 3.2.0
== 3.3.1
== 2.6.3
== 2.2.2
== 2.1.1
== 3.3.3-rc1
== 2.6.2150
== 2.3.3
== 2.7.1
== 3.1.2150
== 2.3.2
== 3.1.2
== 2.6.8
== 2.6.7
== 2.4.6
== 2.7.3
== 2.7.1-rc1
== 2.0
== 2.2.3
== 3.3.4
== 2.5.2
== 2.3.7
== 3.3.6-rc1
== 3.2.3
== 2.6.4
== 3.3.5-rc2
== 2.7.2-rc1
== 2.6.6150
== 2.7.7
== 3.3.5-rc1
== 2.5.3
== 3.2.6
== 3.2
== 2.7.5
== 2.4.4
== 3.3.0
== 2.5.150
== 2.2
== 3.4.2
== 2.6.2
== 2.5.6
== 3.3.3
== 2.3.5
== 3.4-alpha1
== 3.2.4
== 2.7.2150
== 2.1.3
== 3.4.1
== 3.2-alpha
== 2.4.1
== 2.4.3
== 3.3-beta2
== 2.6.5
== 3.1.3
== 3.1.4
CVE-2014-2667
Low
Nov 16, 2014
== 3.3.2
== 3.2.2
== 3.2.5
== 3.3.6
== 3.4.0
== 3.2.1
== 3.2.0
== 3.3.1
== 3.3.4
== 3.3.5
== 3.2.3
== 3.2.6
== 3.3.0
== 3.4.2
== 3.3.3
== 3.2.4
== 3.4.1
CVE-2014-7185
Medium
Oct 8, 2014
== 2.7.6
<= 2.7.7
== 2.7.1150
== 2.7.4
== 2.7.1
== 2.7.3
== 2.7.1-rc1
== 2.7.2-rc1
== 2.7.5
== 2.7.2150
CVE-2014-0224
High
Jun 5, 2014
>= 2.7.0 < 2.7.8
>= 3.4.0 < 3.4.2
CVE-2013-7040
Low
May 19, 2014
== 2.7.6
== 3.3.5
== 3.1
== 3.3.3-rc2
== 3.1.1
== 3.3.2
== 3.0
== 3.3.1-rc1
== 3.0.1
== 3.2.2
== 3.3
== 3.2.5
== 3.1.5
== 3.2.2150
== 3.3.4-rc1
== 2.7.4
== 3.2.1
== 3.2.0
== 3.3.1
== 3.3.3-rc1
== 2.7.1
== 3.1.2
== 2.7.1150
== 2.7.3
== 2.7.1-rc1
== 3.3.4
== 3.2.3
== 3.3.5-rc2
== 2.7.2-rc1
== 2.7.7
== 3.3.5-rc1
== 3.2
== 2.7.5
== 3.3.0
== 3.3.3
== 3.2.4
== 2.7.2150
== 3.2-alpha
== 3.3-beta2
== 3.1.3
== 3.1.4
CVE-2013-7338
High
Apr 22, 2014
== 3.3.3-rc2
== 3.3.2
== 3.3.1-rc1
== 3.3.3-rc1
== 3.3.3
== 3.3.0
== 3.3.0-alpha1
== 3.3.0-alpha2
== 3.3.0-alpha3
== 3.3.0-alpha4
== 3.3.0-beta1
== 3.3.0-beta2
== 3.3.0-rc1
== 3.3.0-rc2
== 3.3.0-rc3
== 3.3.1
CVE-2014-1912
High
Mar 1, 2014
== 2.7.6
== 2.5.1
== 2.6.6
== 2.7.1150
== 2.6.1
== 2.7.4
== 2.5.4
== 2.6.3
== 2.6.2150
== 2.7.1
== 2.6.8
== 2.6.7
== 2.7.3
== 2.7.1-rc1
== 2.5.2
== 2.6.4
== 2.7.2-rc1
== 2.6.6150
== 2.5.3
== 2.7.5
== 2.5.150
== 2.6.2
== 2.5.6
== 2.7.2150
== 2.6.5
== 3.1
== 3.1.1
== 3.3.2
== 3.0
== 3.0.1
== 3.2.2
== 3.3
== 3.2.5
== 3.1.5
== 3.2.2150
== 3.2.1
== 3.2.0
== 3.3.1
== 3.1.2150
== 3.1.2
== 3.2.3
== 3.2
== 3.3.0
== 3.3.3
== 3.4-alpha1
== 3.2.4
== 3.2-alpha
== 3.3-beta2
== 3.1.3
== 3.1.4
CVE-2013-0340
Medium
Jan 21, 2014
>= 3.8.0 < 3.8.12
>= 3.9.0 < 3.9.7
>= 3.7.0 < 3.7.12
>= 3.6.0 < 3.6.15
CVE-2013-2099
Low
Oct 9, 2013
== 3.3.2
== 3.2.2
== 3.2.5
== 3.2.1
== 3.2.0
== 3.3.1
== 3.2.3
== 3.3.0
== 3.2.4
‹
›
‹
1
2
...
8
9
10
11
12
13
›