Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 299,879
With exploit
rpm / rpm
You can search for specific versions with
https://synscan.net/product/rpm/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-6435
High
Dec 16, 2014
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 4.8.0
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
== 1.4
== 2.0.10
== 2.4.5
== 4.9.0-alpha
== 4.0.1
== 4.9.1.2
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 4.6.0
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 4.10.0
== 2.5.5
== 2.0.8
== 4.10.1
== 4.8.1
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 4.9.0
== 2.4.2
== 1.4.5
== 2.0.11
== 4.9.0-rc1
== 3.0.5
== 1.3
== 4.7.2
== 4.9.1
== 2.2.3
== 2.2
<= 4.11.1
== 2.1.2
== 4.6.0-rc2
== 2.3.9
== 4.6.0-rc1
== 2.2.4
== 4.6.0-rc3
== 2.2.9
== 2.5.3
== 2.2.6
== 4.7.0
== 2.3.6
== 2.5
== 2.2.3.10
== 4.9.1.1
== 2.0.5
== 1.4.1
== 4.4.2.3
== 4.10.2
== 2.4.12
== 2.5.4
== 4.6.1
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 4.6.0-rc4
== 4.7.1
== 2.0.4
== 4.9.0-beta1
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 4.5.90
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
CVE-2012-6088
Low
Jan 18, 2013
== 4.10.0
== 4.10.1
CVE-2012-0060
Medium
Jun 4, 2012
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 4.8.0
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
<= 4.9.1.2
== 1.4
== 2.0.10
== 2.4.5
== 4.9.0-alpha
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 4.6.0
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 4.8.1
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 4.9.0
== 2.4.2
== 1.4.5
== 2.0.11
== 4.9.0-rc1
== 3.0.5
== 1.3
== 4.7.2
== 4.9.1
== 2.2.3
== 2.2
== 2.1.2
== 4.6.0-rc2
== 2.3.9
== 4.6.0-rc1
== 2.2.4
== 4.6.0-rc3
== 2.2.9
== 2.5.3
== 2.2.6
== 4.7.0
== 2.3.6
== 2.5
== 2.2.3.10
== 4.9.1.1
== 2.0.5
== 1.4.1
== 4.4.2.3
== 2.4.12
== 2.5.4
== 4.6.1
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 4.6.0-rc4
== 4.7.1
== 2.0.4
== 4.9.0-beta1
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 4.5.90
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
CVE-2012-0061
Medium
Jun 4, 2012
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 4.8.0
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
<= 4.9.1.2
== 1.4
== 2.0.10
== 2.4.5
== 4.9.0-alpha
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 4.6.0
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 4.8.1
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 4.9.0
== 2.4.2
== 1.4.5
== 2.0.11
== 4.9.0-rc1
== 3.0.5
== 1.3
== 4.7.2
== 4.9.1
== 2.2.3
== 2.2
== 2.1.2
== 4.6.0-rc2
== 2.3.9
== 4.6.0-rc1
== 2.2.4
== 4.6.0-rc3
== 2.2.9
== 2.5.3
== 2.2.6
== 4.7.0
== 2.3.6
== 2.5
== 2.2.3.10
== 4.9.1.1
== 2.0.5
== 1.4.1
== 4.4.2.3
== 2.4.12
== 2.5.4
== 4.6.1
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 4.6.0-rc4
== 4.7.1
== 2.0.4
== 4.9.0-beta1
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 4.5.90
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
CVE-2012-0815
Medium
Jun 4, 2012
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 4.8.0
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
<= 4.9.1.2
== 1.4
== 2.0.10
== 2.4.5
== 4.9.0-alpha
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 4.6.0
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 4.8.1
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 4.9.0
== 2.4.2
== 1.4.5
== 2.0.11
== 4.9.0-rc1
== 3.0.5
== 1.3
== 4.7.2
== 4.9.1
== 2.2.3
== 2.2
== 2.1.2
== 4.6.0-rc2
== 2.3.9
== 4.6.0-rc1
== 2.2.4
== 4.6.0-rc3
== 2.2.9
== 2.5.3
== 2.2.6
== 4.7.0
== 2.3.6
== 2.5
== 2.2.3.10
== 4.9.1.1
== 2.0.5
== 1.4.1
== 4.4.2.3
== 2.4.12
== 2.5.4
== 4.6.1
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 4.6.0-rc4
== 4.7.1
== 2.0.4
== 4.9.0-beta1
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 4.5.90
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
CVE-2011-3378
High
Dec 24, 2011
== 4.4.2.1
== 4.8.0
== 4.4.2
== 4.6.0
== 4.4.2.2
== 4.7.2
== 4.7.0
== 4.4.2.3
== 4.6.1
== 4.7.1
<= 4.9.1.1
== 4.4.2.
CVE-2010-2059
High
Jun 8, 2010
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 4.4.2
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
== 2..4.10
== 1.4
== 2.0.10
== 2.4.5
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 2.4.2
== 1.4.5
== 2.0.11
== 3.0.5
== 1.3
== 2.2.3
== 2.2
== 2.1.2
== 2.3.9
== 2.2.4
== 2.2.9
== 2.5.3
== 2.2.6
== 2.3.6
== 2.5
== 2.2.3.10
== 2.0.5
== 2.4.12
== 2.5.4
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
<= 4.4.2.3
== 2.0.4
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
== 4.8.0
== 4.6.0
== 4.7.2
== 4.7.0
== 4.6.1
== 4.7.1
CVE-2010-2197
Medium
Jun 8, 2010
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 4.4.2
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
== 2..4.10
== 1.4
== 2.0.10
== 2.4.5
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 2.4.2
== 1.4.5
== 2.0.11
== 3.0.5
== 1.3
== 2.2.3
== 2.2
== 2.1.2
== 2.3.9
== 2.2.4
== 2.2.9
== 2.5.3
== 2.2.6
== 2.3.6
== 2.5
== 2.2.3.10
== 2.0.5
== 4.4.2.3
== 2.4.12
== 2.5.4
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 2.0.4
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
== 4.6.0
<= 4.8.0
== 4.7.2
== 4.7.0
== 4.6.1
== 4.7.1
CVE-2010-2198
High
Jun 8, 2010
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 4.4.2
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
== 2..4.10
== 1.4
== 2.0.10
== 2.4.5
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 2.4.2
== 1.4.5
== 2.0.11
== 3.0.5
== 1.3
== 2.2.3
== 2.2
== 2.1.2
== 2.3.9
== 2.2.4
== 2.2.9
== 2.5.3
== 2.2.6
== 2.3.6
== 2.5
== 2.2.3.10
== 2.0.5
== 4.4.2.3
== 2.4.12
== 2.5.4
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 2.0.4
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
== 4.6.0
<= 4.8.0
== 4.7.2
== 4.7.0
== 4.6.1
== 4.7.1
CVE-2010-2199
High
Jun 8, 2010
== 2.3.5
== 4.4.2.1
== 1.4.3
== 3.0.1
== 4.1
== 2.2.3.11
== 2.4.4
== 2.3.8
== 2.0.6
== 1.4.4
== 4.4.2
== 1.4.2/a
== 2.4.1
== 2.4.9
== 2.6.7
== 2..4.10
== 1.4
== 2.0.10
== 2.4.5
== 4.0.1
== 2.2.11
== 4.0.4
== 2.2.1
== 2.0.1
== 1.4.2
== 3.0.3
== 2.0.7
== 4.0.2
== 2.2.8
== 3.0.2
== 1.2
== 4.0.
== 2.1.1
== 4.3.3
== 2.5.5
== 2.0.8
== 2.3
== 4.4.2.2
== 2.4.8
== 3.0.4
== 2.5.6
== 2.0
== 2.0.2
== 2.3.2
== 2.4.3
== 2.4.2
== 1.4.5
== 2.0.11
== 3.0.5
== 1.3
== 2.2.3
== 2.2
== 2.1.2
== 2.3.9
== 2.2.4
== 2.2.9
== 2.5.3
== 2.2.6
== 2.3.6
== 2.5
== 2.2.3.10
== 2.0.5
== 4.4.2.3
== 2.4.12
== 2.5.4
== 1.4.7
== 3.0
== 1.4.6
== 2.5.2
== 2.4.11
== 2.0.9
== 2.1
== 2.2.10
== 2.3.3
== 2.3.7
== 2.3.4
== 2.0.4
== 1.3.1
== 3.0.6
== 2.0.3
== 2.3.1
== 4.0.3
== 2.4.6
== 2.5.1
== 2.2.5
== 2.2.2
== 2.2.7
== 4.6.0
<= 4.8.0
== 4.7.2
== 4.7.0
== 4.6.1
== 4.7.1
‹
›
‹
1
2
3
›