Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,990
With exploit
a10networks / advanced_core_operating_system
You can search for specific versions with
https://synscan.net/product/advanced_core_operating_system/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2024-30368
High
Jun 6, 2024
== 4.1.4-p1
== 4.1.4
== 4.1.4-gr1-p13
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-p2
== 4.1.4-p3
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p4
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 4.1.4-gr1-p10
== 5.1.0
== 5.1.0-p3
== 5.2.1
== 5.2.1-p1
== 5.2.1-p2
== 5.2.1-p3
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
== 5.2.1-p8
== 5.1.0-p4
== 5.1.0-p5
== 5.1.0-p6
== 5.2.0
== 5.2.0-p1
== 5.2.1-p9
== 6.0.3
== 6.0.2
== 6.0.2-p1
== 6.0.1
== 6.0.0-p1
== 6.0.0-p2
== 6.0.0-p2-sp1
== 6.0.0
CVE-2024-30369
High
Jun 6, 2024
== 4.1.4-p1
== 4.1.4
== 4.1.4-gr1-p13
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-p2
== 4.1.4-p3
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p4
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 4.1.4-gr1-p10
== 5.1.0
== 5.1.0-p3
== 5.2.1
== 5.2.1-p1
== 5.2.1-p2
== 5.2.1-p3
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
== 5.2.1-p8
== 5.1.0-p4
== 5.1.0-p5
== 5.1.0-p6
== 5.2.0
== 5.2.0-p1
== 5.2.1-p9
== 6.0.3
== 6.0.2
== 6.0.2-p1
== 6.0.1
== 6.0.0-p1
== 6.0.0-p2
== 6.0.0-p2-sp1
== 6.0.0
CVE-2023-42130
High
May 3, 2024
>= 5.1.0 < 5.2.1
>= 6.0.0 < 6.0.2
== 4.1.4-gr1-p14
== 4.1.4
== 4.1.4-gr1-p4
== 4.1.4-gr1-p13
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p10
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 5.2.1-p2
== 5.2.1-p1
== 5.2.1
== 5.2.1-p3
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
== 5.2.1-p8
== 5.2.1-p9
CVE-2023-42129
Unknown
May 3, 2024
>= 5.1.0 < 5.2.1
>= 6.0.0 < 6.0.2
== 4.1.4
== 4.1.4-gr1-p4
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 4.1.4-gr1-p10
== 5.2.1
== 5.2.1-p1
== 5.2.1-p2
== 5.2.1-p3
== 5.2.1-p8
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
CVE-2020-24384
Critical
Nov 10, 2020
== 5.1.0
== 5.1.0-p3
== 4.1.4
== 4.1.4-gr1-p4
== 4.1.2
== 4.1.2-p5
== 4.1.1
== 4.1.1-p13
== 4.1.100
== 4.1.100-p7
== 4.1.0
== 4.1.0-p13
== 4.0.1-p3
== 4.0.0
== 3.2.5
== 3.2.5-p1
== 3.2.4
== 3.2.4-p5
== 3.2.3
== 3.2.3-p5
== 3.2.2
== 3.2.2-p8
CVE-2018-5390
High
Aug 6, 2018
== 3.2.2-p5
== 3.2.2
== 4.1.0
== 4.1.0-p11
== 4.1.1-p8
== 4.1.2-p4
== 4.1.2
== 4.1.4
== 4.1.4-p1
CVE-2016-10213
Low
Feb 8, 2017
<= 2.7.2
CVE-2014-3976
Medium
Jun 5, 2014
== 2.7.0
== 2.7.1