Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 308,377
university_of_washington / imap
You can search for specific versions with
https://synscan.net/product/imap/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2008-5514
Low
Dec 23, 2008
== 2002
== 2006e
== 2004b
== 2004d
== 2004f
== 2006a
== 2002d
== 2002f
== 2004
== 2006k
== 2004a
== 2004c
== 2001a
== 2006j
== 2000
== 2006f
== 2006h
== 2002a
<= 2007d
== 2007
== 2001
== 2006
== 2007a
== 2007b
== 2006b
== 2006c
== 2004e
== 2000b
== 2002b
== 2006i
== 2000a
== 2004g
== 2000c
== 2002c
== 2006d
== 2002e
== 2006g
CVE-2000-1197
Low
Aug 31, 2001
== 4.5
CVE-2000-0847
High
Nov 14, 2000
== 4.7c
== 4.7b
CVE-2000-0284
High
Apr 16, 2000
== 12.264
CVE-1999-0920
High
May 26, 1999
== 4.4
CVE-1999-0005
High
Jul 20, 1998
== 10.234
CVE-1999-0042
High
Apr 7, 1997
== 4
cyrus / imap
You can search for specific versions with
https://synscan.net/product/imap/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2021-33582
High
Sep 1, 2021
< 3.0.16
>= 3.2.0 < 3.2.8
>= 3.4.0 < 3.4.2
CVE-2021-32056
Low
May 10, 2021
>= 3.3.0 < 3.4.1
< 3.2.7
CVE-2019-19783
Medium
Dec 16, 2019
>= 3.1.0 < 3.1.8
>= 2.5.0 < 2.5.15
>= 3.0.0 < 3.0.13
CVE-2019-18928
Critical
Nov 15, 2019
>= 2.5.0 < 2.5.14
>= 3.0.0 < 3.0.12
CVE-2019-11356
Critical
Jun 3, 2019
>= 3.0.0 <= 3.0.9
>= 2.5.0 <= 2.5.12
CVE-2017-14230
Medium
Sep 10, 2017
<= 3.0.3
CVE-2015-8078
High
Dec 3, 2015
== 2.4.4
== 2.3.7
== 2.4.6
== 2.3.4
== 2.4.16
== 2.4.1
== 2.3.5
== 2.3.17
== 2.4.0
== 2.4.11
== 2.5.1
== 2.4.8
== 2.4.10
== 2.3.3
== 2.3.8
== 2.4.2
== 2.5.0
== 2.4.14
== 2.3.14
== 2.3.1
== 2.4.17
== 2.3.13
== 2.3.10
== 2.3.12
== 2.3.9
== 2.3.18
== 2.4.3
== 2.4.5
== 2.4.7
== 2.5.2
== 2.3.16
== 2.4.9
== 2.3.6
== 2.4.13
== 2.4.12
== 2.5.3
== 2.3.11
== 2.4.15
== 2.3.15
== 2.3.0
== 2.3.2
CVE-2015-8077
High
Dec 3, 2015
== 2.4.4
== 2.3.7
== 2.4.6
== 2.3.4
== 2.4.16
== 2.4.1
== 2.3.5
== 2.3.17
== 2.4.0
== 2.4.11
== 2.5.1
== 2.4.8
== 2.4.10
== 2.3.3
== 2.3.8
== 2.4.2
== 2.5.0
== 2.4.14
== 2.3.14
== 2.3.1
== 2.4.17
== 2.3.13
== 2.3.10
== 2.3.12
== 2.3.9
== 2.3.18
== 2.4.3
== 2.4.5
== 2.4.7
== 2.5.2
== 2.3.16
== 2.4.9
== 2.3.6
== 2.4.13
== 2.4.12
== 2.5.3
== 2.3.11
== 2.4.15
== 2.3.15
== 2.3.0
== 2.3.2
CVE-2015-8076
High
Dec 3, 2015
== 2.4.4
== 2.3.7
== 2.4.6
== 2.3.4
== 2.4.16
== 2.4.1
== 2.3.5
== 2.3.17
== 2.4.0
== 2.4.11
== 2.5.1
== 2.4.8
== 2.4.10
== 2.3.3
== 2.3.8
== 2.4.2
== 2.5.0
== 2.4.14
== 2.3.14
== 2.3.1
== 2.4.17
== 2.3.13
== 2.3.10
== 2.3.12
== 2.3.9
== 2.3.18
== 2.4.3
== 2.4.5
== 2.4.7
== 2.5.2
== 2.3.16
== 2.4.9
== 2.3.6
== 2.4.13
== 2.4.12
== 2.5.3
== 2.3.11
== 2.4.15
== 2.3.15
== 2.3.0
== 2.3.2