Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 308,681
With exploit
ibm / tivoli_storage_manager
You can search for specific versions with
https://synscan.net/product/tivoli_storage_manager/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-5371
Low
Jan 23, 2014
== 6.3.1
== 6.4.0
CVE-2013-2964
High
Oct 4, 2013
== 6.3.0
== 6.3.0.17
== 6.1.3
== 6.1.5.4
== 6.1.4
== 6.1.2
== 6.1.1
== 6.1.5
== 6.1.0
== 5.1.6
== 5.3.6.3
== 5.4.3.3
== 5.2.8
== 5.4
== 5.3.6.1
== 5.4.2
== 5.2.0
== 5.3.6.6
== 5.1.9
== 5.1.10
== 5.3.2.4
== 5.2.9
== 5.3.4
== 5.5.0
== 5.4.2.2
<= 5.5.4
== 5.5.2
== 5.2.4
== 5.2.2
== 5.3.6.2
== 5.1.8
== 5.1.0
== 5.1.1
== 5.3.1
== 5.4.3.2
== 5.1.5
== 5.2.5.1
== 5.4.4.0
== 5.3.3
== 5.3.0
== 5.4.2.4
== 5.5.1
== 5.2
== 5.4.1
== 5.4.0
== 5.3.2
== 5.2.7
== 5.1.7
== 5.5.3
== 5.3.6.4
== 5.2.1
== 5.3.5.1
== 5.2.5.2
== 5.3
== 5.4.2.3
== 5.4.3.0
== 5.2.5.3
== 5.3.6.5
== 6.2.3
== 6.2.4.7
== 6.2.0
== 6.2.2
== 6.2.4
== 6.2.1
CVE-2013-0472
Medium
Feb 21, 2013
== 5.1.6
== 6.2.0.0
== 5.3.6.3
== 5.4.3.3
== 5.2.8
== 5.4
== 5.3.6.1
== 5.4.2
== 4.2.3
== 5.2.0
== 5.3.6.6
== 5.1.9
== 5.1.10
== 5.3.2.4
== 6.1.3
== 4.2.2
== 5.2.9
== 5.3.4
== 5.5.0
== 5.4.2.2
== 5.5.2
== 5.2.4
== 5.2.2
== 5.3.6.2
== 5.1.8
== 5.1.0
== 5.1.1
== 5.3.1
== 3.2.1
== 5.4.3.2
== 5.1.5
== 5.2.5.1
== 5.4.4.0
== 4.2
== 6.0
== 5.3.3
== 6.1.2
== 5.3.0
== 5.4.2.4
== 6.1.1
== 5.5.1
== 5.2
== 5.4.1
== 6.2.0
== 5.4.0
== 5.3.2
<= 6.2.4.4
== 5.2.7
== 5.1.7
== 3.1.0
== 6.1.0
== 5.3.6.4
== 5.2.1
== 5.3.5.1
== 5.2.5.2
== 5.3
== 4.2.1
== 5.4.2.3
== 4.2.4
== 5.4.3.0
== 5.2.5.3
== 5.3.6.5
== 6.2.1
== 6.3.0.0
== 6.4.0.0
CVE-2013-0471
Low
Feb 21, 2013
== 5.1.6
== 6.2.0.0
== 5.3.6.3
== 5.4.3.3
== 5.2.8
== 5.4
== 5.3.6.1
== 5.4.2
== 4.2.3
== 5.2.0
== 5.3.6.6
== 5.1.9
== 5.1.10
== 5.3.2.4
== 6.1.3
== 4.2.2
== 5.2.9
== 5.3.4
== 5.5.0
== 5.4.2.2
== 5.5.2
== 5.2.4
== 5.2.2
== 5.3.6.2
== 5.1.8
== 5.1.0
== 5.1.1
== 5.3.1
== 3.2.1
== 5.4.3.2
== 5.1.5
== 5.2.5.1
== 5.4.4.0
== 4.2
== 6.0
== 5.3.3
== 6.1.2
== 5.3.0
== 5.4.2.4
== 6.1.1
== 5.5.1
== 5.2
== 5.4.1
== 6.2.0
== 5.4.0
== 5.3.2
<= 6.2.4.4
== 5.2.7
== 5.1.7
== 3.1.0
== 6.1.0
== 5.3.6.4
== 5.2.1
== 5.3.5.1
== 5.2.5.2
== 5.3
== 4.2.1
== 5.4.2.3
== 4.2.4
== 5.4.3.0
== 5.2.5.3
== 5.3.6.5
== 6.2.1
== 6.3.0.0
== 6.4.0.0
CVE-2011-1222
High
Jul 17, 2011
<= 5.4.3.3
== 4.2
== 4.2.1
== 5.1.8
== 5.2.5.1
== 5.2.7
== 5.2.8
== 5.2.9
== 5.3.0
== 5.3.1
== 5.3.2
== 5.3.3
== 5.3.6.1
== 5.3.6.2
== 5.3.6.3
== 5.3.6.4
== 5.3.6.5
== 5.3.6.6
== 5.4.1
== 5.4.2
== 5.4.3.0
== 5.4.3.2
== 5.5.0
== 5.5.1
== 5.5.2
== 6.0
== 6.1.0
== 6.1.1
== 6.1.2
== 6.1.3
== 6.2.0
== 6.2.1
CVE-2011-1223
High
Jul 17, 2011
<= 5.4.3.3
== 4.2
== 4.2.1
== 5.1.8
== 5.2.5.1
== 5.2.7
== 5.2.8
== 5.2.9
== 5.3.0
== 5.3.1
== 5.3.2
== 5.3.3
== 5.3.6.1
== 5.3.6.2
== 5.3.6.3
== 5.3.6.4
== 5.3.6.5
== 5.3.6.6
== 5.4.1
== 5.4.2
== 5.4.3.0
== 5.4.3.2
== 5.5.0
== 5.5.1
== 5.5.2
== 6.0
== 6.1.0
== 6.1.1
== 6.1.2
== 6.1.3
== 6.2.0
== 6.2.1
CVE-2010-4604
High
Dec 29, 2010
>= 5.3.0 <= 5.3.6.7
>= 5.4.0 <= 5.4.3.3
>= 5.5.0 <= 5.5.2.7
>= 6.1.0 <= 6.1.3
CVE-2010-4605
Medium
Dec 29, 2010
== 5.3.0
== 5.3.1
== 5.3.2
== 5.3.2.4
== 5.3.3
== 5.3.4
== 5.3.5.1
== 5.3.6.1
== 5.3.6.2
== 5.3.6.3
== 5.3.6.4
== 5.3.6.5
== 5.3.6.6
== 5.4.0
== 5.4.1
== 5.4.2
== 5.4.2.2
== 5.4.2.3
== 5.4.2.4
== 5.5.0
== 5.5.1
== 5.5.2
== 6.1.0
== 6.1.1
== 6.1.2
== 6.1.3
== 6.2.0
== 6.2.1
CVE-2010-4606
High
Dec 29, 2010
>= 5.4.0 < 5.4.3.4
>= 5.5.0 < 5.5.3
>= 6.1.0 < 6.1.4
>= 6.2.0 < 6.2.2
CVE-2009-3853
High
Nov 4, 2009
== 5.3.5
== 5.3.6.3
== 5.3.6.1
== 5.3.6.6
== 5.4.2
== 5.3.2.4
== 5.3.4
== 5.5.0
== 5.5.2
== 5.3.6.2
== 5.3.1
== 5.3.6
== 5.3.3
== 5.3.0
== 5.5.1
== 5.4.1
== 5.4.0
== 5.3.2
== 6.1.0
== 5.3.6.4
== 5.3.5.1
== 5.3
== 5.2.5.3
== 5.3.6.5
‹
›
‹
1
2
3
4
5
›