Vulnerability Database

328,409

Total vulnerabilities in the database

Vulnerabilities for products matching "database"

Found 11 matching products. Filters apply to all results.

You can search for specific versions with /product/database/1.2.3

progress / database

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Low August 7, 2003 8/7/03
== 9.1

rapidshare / database

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Low January 8, 2008 1/8/08
*

oracle / database

64 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium April 18, 2023 4/18/23
== 19c
== 21c
Low January 18, 2023 1/18/23
== 19c
== 21c
Medium January 18, 2023 1/18/23
== 19c
== 21c
High October 18, 2022 10/18/22
== 19c
Medium July 19, 2022 7/19/22
== 12.1.0.2
== 19c
== 21c
Low July 19, 2022 7/19/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Medium July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Low July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Low July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
Critical July 11, 2022 7/11/22
== 12.1.0.2
== 19c
== 21c
High June 1, 2022 6/1/22
== 12.1.0.2
== 19c
== 21c
Medium April 19, 2022 4/19/22
== 12.1.0.2
== 19c
== 21c
High April 19, 2022 4/19/22
== 19c
Medium April 19, 2022 4/19/22
== 12.1.0.2
== 19c
== 21c
Low October 20, 2021 10/20/21
== 12.1.0.2
== 12.2.0.1
== 19c
== 21c
Low October 20, 2021 10/20/21
== 12.1.0.2
== 12.2.0.1
== 19c
== 21c
Medium October 20, 2021 10/20/21
== 12.2.0.1
== 19c
== 21c
Low July 21, 2021 7/21/21
== 12.1.0.2
== 12.2.0.1
== 19c
Low July 21, 2021 7/21/21
== 12.1.0.2
== 12.2.0.1
== 19c
Low July 21, 2021 7/21/21
== 12.1.0.2
== 12.2.0.1
== 19c
High July 21, 2021 7/21/21
== 12.1.0.2
== 12.2.0.1
== 19c
Low April 22, 2021 4/22/21
== 18c
== 19c
Low April 22, 2021 4/22/21
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
High March 1, 2021 3/1/21
== 12.2.0.1
== 19c
== 21c
High March 1, 2021 3/1/21
== 12.2.0.1
== 19c
== 21c
Medium December 16, 2020 12/16/20
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
High December 16, 2020 12/16/20
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
Low October 21, 2020 10/21/20
== 19c
Low July 15, 2020 7/15/20
== 12.1.0.2
== 12.2.0.1
== 18c
== 19d
High May 20, 2020 5/20/20
== 12.2.0.1
== 19c
== 21c
Medium September 18, 2019 9/18/19
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
Medium September 18, 2019 9/18/19
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
Medium September 18, 2019 9/18/19
== 12.1.0.2
== 12.2.0.1
== 18c
== 19c
Low April 23, 2019 4/23/19
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
== 18c
Low January 16, 2019 1/16/19
== 12.1.0.2
== 12.2.0.1
== 18c
Medium January 16, 2019 1/16/19
== 12.1.0.2
== 12.2.0.1
== 18c
Medium July 26, 2018 7/26/18
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
== 18c
== 19c
Low October 19, 2017 10/19/17
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
Low October 19, 2017 10/19/17
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
Low October 19, 2017 10/19/17
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
Low October 19, 2017 10/19/17
== 12.1.0.2
== 11.2.0.4
Medium August 8, 2017 8/8/17
== 12.1.0.2
== 11.2.0.4
== 12.2.0.1
Low April 24, 2017 4/24/17
== 12.1.0.2
== 11.2.0.4
Medium January 27, 2017 1/27/17
== 12.1.0.2
== 11.2.0.4
Low October 25, 2016 10/25/16
== 12.1.0.2

jenkins / database

3 vulnerabilities found
Title Severity Exploit Date Affected Version
High September 1, 2020 9/1/20
<= 1.6
High September 1, 2020 9/1/20
<= 1.6
Medium September 1, 2020 9/1/20
<= 1.6
Composer icon

illuminate / database

4 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium May 15, 2024 5/15/24
>= 4.0.0 < 4.1.29
High April 29, 2021 4/29/21
>= 8.0.0 < 8.40.0
< 6.20.26
High February 2, 2021 2/2/21
< 6.20.14
>= 7.0.0 < 7.30.4
>= 8.0.0 < 8.24.0
High January 19, 2021 1/19/21
< 6.20.12
>= 7.0.0 < 7.30.3
>= 8.0.0 < 8.22.1
Maven icon

org.jenkins-ci.plugins / database

3 vulnerabilities found
Title Severity Exploit Date Affected Version
High September 1, 2020 9/1/20
< 1.7
Medium September 1, 2020 9/1/20
< 1.7
High September 1, 2020 9/1/20
< 1.7
Composer icon

liftkit / database

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium January 16, 2023 1/16/23
< 2.13.2
Composer icon

cakephp / database

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical January 17, 2023 1/17/23
>= 4.2.0 < 4.2.12
>= 4.3.0 < 4.3.11
>= 4.4.0 < 4.4.10
Node.js icon

@strapi / database

2 vulnerabilities found
Title Severity Exploit Date Affected Version
High July 25, 2023 7/25/23
< 4.10.8
Low July 25, 2023 7/25/23
< 4.10.8
Maven icon

org.openrefine / database

3 vulnerabilities found
Title Severity Exploit Date Affected Version
High February 12, 2024 2/12/24
< 3.7.8
Critical September 15, 2023 9/15/23
< 3.7.5
High September 15, 2023 9/15/23
< 3.7.5
Composer icon

Joomla / database

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical April 8, 2025 4/8/25
>= 3.0.0 < 3.4.0
>= 1.0.0 < 2.2.0

Showing vulnerabilities for 11 products matching "database". Each product has independent pagination.

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.