Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,445
With exploit
carnegie_mellon_university / cyrus_imap_server
You can search for specific versions with
https://synscan.net/product/cyrus_imap_server/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2004-1011
High
Jan 10, 2005
== 2.2.6
== 2.1.10
== 2.2.8
== 2.2.0_alpha
== 2.1.9
== 2.2.5
== 2.2.2_beta
== 2.1.16
== 2.2.7
== 2.2.3
== 2.2.1_beta
== 2.1.7
== 2.2.4
CVE-2004-1012
High
Jan 10, 2005
== 2.2.6
== 2.1.10
== 2.2.8
== 2.2.0_alpha
== 2.1.9
== 2.2.5
== 2.2.2_beta
== 2.1.16
== 2.2.7
== 2.2.3
== 2.2.1_beta
== 2.1.7
== 2.2.4
CVE-2004-1013
High
Jan 10, 2005
== 2.2.6
== 2.1.10
== 2.2.8
== 2.2.0_alpha
== 2.1.9
== 2.2.5
== 2.2.2_beta
== 2.1.16
== 2.2.7
== 2.2.3
== 2.2.1_beta
== 2.1.7
== 2.2.4
CVE-2004-1015
High
Jan 10, 2005
== 2.2.6
== 2.1.10
== 2.2.8
== 2.2.9
== 2.2.0_alpha
== 2.0.16
== 1.5.19
== 2.1.9
== 2.2.5
== 2.2.2_beta
== 1.4
== 2.1.16
== 2.2.7
== 2.2.3
== 2.2.1_beta
== 2.1.7
== 2.2.4
== 2.0.12
CVE-2004-1067
High
Jan 10, 2005
== 2.2.6
== 2.1.10
== 2.2.8
== 2.2.9
== 2.2.0_alpha
== 2.0.16
== 1.5.19
== 2.1.9
== 2.2.5
== 2.2.2_beta
== 1.4
== 2.1.16
== 2.2.7
== 2.2.3
== 2.2.1_beta
== 2.1.7
== 2.2.4
== 2.0.12
CVE-2002-1580
High
Jun 14, 2004
== 2.1.10
== 2.0.16
== 1.5.19
== 2.1.9
== 1.4
== 2.0.12
CVE-2001-1154
Medium
Aug 30, 2001
== 2.0.16
== 2.0.15
== 1.6.24
cmu / cyrus_imap_server
You can search for specific versions with
https://synscan.net/product/cyrus_imap_server/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-3208
High
Sep 14, 2011
== 2.2.12
== 2.2.14
== 2.3.13
<= 2.3.16
== 2.2.13p1
== 2.3.12
== 2.1.17
== 2.3.6
== 2.3.0
== 2.2.11
== 2.3.14
== 2.3.2
== 2.3.11
== 2.3.8
== 2.3.5
== 2.2.9
== 2.3.9
== 2.3.10
== 2.2.13
== 2.1.16
== 2.3.7
== 2.2.8
== 2.0.17
== 2.3.1
== 2.3.4
== 2.2.10
== 2.1.18
== 2.3.3
== 2.3.15
== 2.4.1
== 2.4.5
== 2.4.0
== 2.4.10
== 2.4.8
== 2.4.7
== 2.4.6
== 2.4.3
== 2.4.4
== 2.4.2
== 2.4.9
CVE-2011-3481
Low
Sep 14, 2011
== 2.2.12
== 2.3.13
== 2.2.13p1
== 2.3.12
== 2.4.1
== 2.1.17
== 2.4.5
== 2.3.6
== 2.3.0
== 2.2.11
== 2.3.14
== 2.3.2
== 2.4.0
== 2.3.11
== 2.3.17
<= 2.4.10
== 2.3.8
== 2.4.8
== 2.3.5
== 2.4.7
== 2.2.9
== 2.4.6
== 2.4.3
== 2.4.4
== 2.3.9
== 2.3.10
== 2.2.13
== 2.1.16
== 2.3.7
== 2.2.8
== 2.3.16
== 2.0.17
== 2.3.1
== 2.4.2
== 2.3.4
== 2.2.10
== 2.1.18
== 2.3.3
== 2.3.15
== 2.4.9
CVE-2011-1926
Medium
May 23, 2011
== 2.2.12
== 2.3.13
== 2.2.13p1
== 2.3.12
== 2.4.1
== 2.1.17
== 2.4.5
== 2.3.6
== 2.3.0
== 2.2.11
== 2.3.14
== 2.3.2
<= 2.4.6
== 2.4.0
== 2.3.11
== 2.3.8
== 2.3.5
== 2.2.9
== 2.4.3
== 2.4.4
== 2.3.9
== 2.3.10
== 2.2.13
== 2.1.16
== 2.3.7
== 2.2.8
== 2.3.16
== 2.0.17
== 2.3.1
== 2.4.2
== 2.3.4
== 2.2.10
== 2.1.18
== 2.3.3
== 2.3.15
CVE-2009-2632
Low
Sep 8, 2009
== 2.3.14
== 2.2.13