Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,495
With exploit
kde / kde_sc
You can search for specific versions with
https://synscan.net/product/kde_sc/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-2725
Medium
Feb 4, 2014
<= 4.7.4
== 4.7.0
== 4.7.3
== 4.7.1
== 4.7.2
CVE-2013-4132
Medium
Sep 16, 2013
<= 4.10.5
CVE-2011-3365
Low
Nov 29, 2011
== 4.6.4
== 4.7.0
== 4.6.1
== 4.7.1
== 4.6.2
== 4.6.3
== 4.6.0
== 4.6.5
CVE-2011-1586
Medium
Apr 27, 2011
== 4.1.0-alpha1
== 4.0.3
== 4.0.5
== 4.5.2
== 4.3.0-beta3
== 4.0.0-alpha1
== 4.2.3
== 4.1.3
== 4.4.0-rc1
== 4.3.0-rc3
== 4.6-beta1
== 4.5.4
== 4.2-rc
== 4.0.0-rc2
== 4.4.1
== 4.4.0-beta1
== 4.2.2
== 4.1.0
== 4.6-rc1
== 4.4.2
== 4.5.5
== 4.5.1
== 4.0.0-beta2
== 4.0.0-beta1
== 2.2.0
== 4.4.0-beta2
== 4.1.2
== 4.0.0-beta4
== 4.1.0-beta1
== 4.4.0
== 4.2.1
== 4.4.3
== 4.3.5
== 4.0.0-beta3
== 4.3.0
== 4.0.0
== 4.6.1
== 4.3.2
== 4.6-rc2
== 4.3.0-rc1
== 4.4.4
== 4.2-beta2
== 4.3.0-rc2
== 4.1.1
== 4.1.0-rc
== 4.1.80
== 4.0.4
== 4.3.3
== 4.2.4
== 4.1.85
== 4.5.3
== 4.4.5
== 4.0.0-rc1
== 4.1.0-beta2
== 4.6-beta2
== 4.3.1
== 4.0.2
== 4.0.1
== 4.4.0-rc2
== 4.3.0-beta1
== 4.3.4
<= 4.6.2
== 4.2.0
== 4.6.0
== 4.4.0-rc3
== 4.1.4
== 3.5.10
== 4.1.96
== 4.0.0-alpha2
== 4.5.0
CVE-2011-1168
Low
Apr 18, 2011
== 4.5.2
== 4.4.0-rc1
== 4.6-beta1
== 4.5.4
== 4.4.1
== 4.4.0-beta1
== 4.6-rc1
== 4.4.2
== 4.5.5
== 4.5.1
== 4.4.0-beta2
== 4.4.0
== 4.4.3
== 4.6.1
== 4.6-rc2
== 4.4.4
== 4.5.3
== 4.4.5
== 4.6-beta2
== 4.4.0-rc2
== 4.6.0
== 4.4.0-rc3
== 4.5.0
CVE-2010-2575
Medium
Aug 30, 2010
== 4.3.0
== 4.3.1
== 4.3.2
== 4.3.3
== 4.3.4
== 4.3.5
== 4.4.0
== 4.4.1
== 4.4.2
== 4.4.3
== 4.4.4
== 4.4.5
== 4.5.0
CVE-2010-1000
Medium
May 17, 2010
== 4.1.0-alpha1
== 4.0.3
== 4.0.5
== 4.3.0-beta3
== 4.0.0-alpha1
== 4.2.3
== 4.1.3
== 4.4.0-rc1
== 4.3.0-rc3
== 4.2-rc
== 4.0.0-rc2
== 4.4.1
== 4.4.0-beta1
== 4.2.2
== 4.1.0
== 4.4.2
== 4.0.0-beta2
== 4.0.0-beta1
== 4.4.0-beta2
== 4.1.2
== 4.0.0-beta4
== 4.1.0-beta1
== 4.4.0
== 4.2.1
== 4.4.3
== 4.3.5
== 4.0.0-beta3
== 4.3.0
== 4.0.0
== 4.3.2
== 4.3.0-rc1
== 4.2-beta2
== 4.3.0-rc2
== 4.1.1
== 4.1.0-rc
== 4.1.80
== 4.0.4
== 4.3.3
== 4.2.4
== 4.1.85
== 4.0.0-rc1
== 4.1.0-beta2
== 4.3.1
== 4.0.2
== 4.0.1
== 4.4.0-rc2
== 4.3.0-beta1
== 4.3.4
== 4.2.0
== 4.4.0-rc3
== 4.1.4
== 4.1.96
== 4.0.0-alpha2
CVE-2010-1511
Medium
May 17, 2010
== 2.2.0
== 3.5.10
== 4.0.0-alpha2
== 4.0.0-rc1
== 4.0.0-beta4
== 4.0.0-beta3
== 4.0.0
== 4.0.0-alpha1
== 4.0.0-rc2
== 4.0.0-beta2
== 4.0.0-beta1
== 4.0.1
== 4.0.2
== 4.0.3
== 4.0.4
== 4.0.5
== 4.1.0-alpha1
== 4.1.0
== 4.1.0-beta1
== 4.1.0-rc
== 4.1.0-beta2
== 4.1.1
== 4.1.2
== 4.1.3
== 4.1.4
== 4.1.80
== 4.1.85
== 4.1.96
== 4.2-rc
== 4.2-beta2
== 4.2.0
== 4.2.1
== 4.2.2
== 4.2.3
== 4.2.4
== 4.3.0-beta1
== 4.3.0-beta3
== 4.3.0-rc3
== 4.3.0-rc2
== 4.3.0-rc1
== 4.3.0
== 4.3.1
== 4.3.2
== 4.3.3
== 4.3.4
== 4.3.5
== 4.4.0-beta2
== 4.4.0
== 4.4.0-rc1
== 4.4.0-beta1
== 4.4.0-rc3
== 4.4.0-rc2
== 4.4.1
== 4.4.2
== 4.4.3
CVE-2010-0436
Medium
Apr 15, 2010
== 4.4.1
== 4.2.2
== 4.4.2
== 2.2.0
== 4.1.2
== 4.4.0
== 4.3.5
== 4.3.0
== 4.3.1
== 4.3.4
== 3.5.10
CVE-2010-0923
Medium
Mar 3, 2010
== 4.4.0