Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 300,830
With exploit
imp / imp
You can search for specific versions with
https://synscan.net/product/imp/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2000-0458
Low
Apr 22, 2000
== 2.0.10
== 2.2_pre9
== 2.0.11
== 2.2_pre10
== 2.0.9
CVE-2000-0459
Medium
Apr 22, 2000
== 2.0.10
== 2.2_pre9
== 2.2_pre11
== 2.0.11
== 2.2_pre12
== 2.2_pre10
== 2.0.9
horde / imp
You can search for specific versions with
https://synscan.net/product/imp/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-5565
Low
Apr 5, 2014
<= 5.0.23
== 5.0.10
== 5.0.11
== 5.0.12
== 5.0.13
== 5.0.14
== 5.0.15
== 5.0.16
== 5.0.17
== 5.0.18
== 5.0.19
== 5.0.20
== 5.0.21
== 5.0.22
== 5.0.4
== 5.0.5
== 5.0.6
== 5.0.7
== 5.0.8
== 5.0.9
CVE-2012-6640
Low
Apr 5, 2014
== 5.0.11
<= 5.0.21
== 5.0.3
== 5.0.2
== 5.0.6
== 5.0.9
== 5.0-rc1
== 5.0.19
== 5.0.17
== 5.0-alpha1
== 5.0.4
== 5.0.1
== 5.0.12
== 5.0-beta1
== 5.0.18
== 5.0.13
== 5.0.14
== 5.0.7
== 5.0.8
== 5.0.10
== 5.0-rc2
== 5.0
== 5.0.5
== 5.0.20
== 5.0.15
== 5.0.16
CVE-2012-0791
Low
Jan 24, 2012
== 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 5.0.3
== 3.1
== 5.0.2
== 4.3.6
== 3.2.4
== 3.1.2
== 5.0-rc1
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 5.0-alpha1
== 4.3.9
== 2.2.4
== 2.0
== 4.2.1
== 5.0.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 4.3.8
== 3.2.3
== 3.2.5
== 5.0-beta1
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 5.0.4-git
== 5.0-rc2
== 4.3.7
== 3.2.7
== 5.0
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-4778
Low
Apr 4, 2011
== 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 4.3.6
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
<= 4.3.7
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-3695
Low
Mar 31, 2011
== 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 4.3.6
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
<= 4.3.7
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-0463
Medium
Jan 29, 2010
== 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
<= 4.3.6
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2007-6018
Medium
Jan 11, 2008
== 4.1.5
CVE-2007-1515
Low
Mar 20, 2007
<= 4.1.3
CVE-2007-1474
Medium
Mar 16, 2007
== 2.0
== 2.2
== 2.2.1
== 2.2.2
== 2.2.3
== 2.2.4
== 2.2.5
== 2.2.6
== 2.2.7
== 2.2.8
== 2.3
== 3.0
== 3.1
== 3.1.2
== 3.2
== 3.2.1
== 3.2.2
== 3.2.3
== 3.2.4
== 3.2.5
== 3.2.6
CVE-2006-4255
Low
Aug 21, 2006
== 2.0
== 2.2
== 2.2.1
== 2.2.2
== 2.2.3
== 2.2.4
== 2.2.5
== 2.2.6
== 2.2.7
== 2.2.8
== 2.3
== 3.0
== 3.1
== 3.1.2
== 3.2
== 3.2.1
== 3.2.2
== 3.2.3
== 3.2.4
== 3.2.5
== 4.0
== 4.0.1
== 4.0.2
== 4.0.3
== 4.0.4
‹
›
‹
1
2
3
›