Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 315,050
ibm / rational_clearcase
You can search for specific versions with
https://synscan.net/product/rational_clearcase/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2019-4059
Critical
Feb 15, 2019
>= 9.0.1 < 9.0.1.5
CVE-2014-0931
Medium
Apr 20, 2018
>= 8.0.1 <= 8.0.1.3
>= 8.0 <= 8.0.0.10
>= 7.1.2 <= 7.1.2.13
>= 7.1 <= 7.1.0.2
>= 7.1.1 <= 7.1.1.9
CVE-2015-5039
Medium
Mar 26, 2018
>= 8.0.x <= 8.0.0.17
>= 7.1 <= 7.1.2.16
>= 8.0.1 <= 8.0.1.10
CVE-2014-6221
High
Apr 6, 2015
== 7.1.2.12
== 8.0.0.10
== 7.1.2.10
== 8.0.0.12
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.2
== 8.0.0.1
== 8.0.1.3
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 8.0.1.5
== 7.1.2.3
== 7.1.2.13
== 7.1.2.15
== 8.0.0.7
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 8.0.0.4
== 8.0.0.8
== 8.0.0.13
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 8.0.0
== 8.0.1.6
== 7.1.2.4
== 8.0.0.6
== 7.1.2.2
== 8.0.0.3
== 7.1.2.16
== 7.1.2.11
CVE-2014-6134
Low
Mar 25, 2015
== 8.0.0.10
== 8.0.0.12
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 8.0.0.1
== 8.0.1.3
== 8.0.0.5
== 8.0.1.5
== 8.0.0.7
== 8.0.0.2
== 8.0.1.1
== 8.0.0.4
== 8.0.0.8
== 8.0.0.13
== 8.0.1
== 8.0.0.9
== 8.0.0
== 8.0.1.6
== 8.0.0.6
== 8.0.0.3
CVE-2014-3103
Medium
Sep 23, 2014
== 7.1.2.12
== 8.0.0.10
== 7.1.1.8
== 7.1.2.10
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.1.3
== 7.1.2
== 8.0.0.1
== 7.1.1.6
== 8.0.1.3
== 7.1.1.5
== 7.1.1
== 8.0
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 7.1.2.3
== 7.1.2.13
== 7.1.0.2
== 7.1.0.1
== 8.0.0.7
== 7.1.1.1
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 7.1
== 8.0.0.4
== 8.0.0.8
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 7.1.1.4
== 7.1.2.4
== 8.0.0.6
== 7.1.1.7
== 7.1.2.2
== 8.0.0.3
== 7.1.1.9
== 7.1.1.2
== 7.1.2.11
CVE-2014-3104
Medium
Sep 23, 2014
== 7.1.2.12
== 8.0.0.10
== 7.1.1.8
== 7.1.2.10
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.1.3
== 7.1.2
== 8.0.0.1
== 7.1.1.6
== 8.0.1.3
== 7.1.1.5
== 7.1.1
== 8.0
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 7.1.2.3
== 7.1.2.13
== 7.1.0.2
== 7.1.0.1
== 8.0.0.7
== 7.1.1.1
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 7.1
== 8.0.0.4
== 8.0.0.8
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 7.1.1.4
== 7.1.2.4
== 8.0.0.6
== 7.1.1.7
== 7.1.2.2
== 8.0.0.3
== 7.1.1.9
== 7.1.1.2
== 7.1.2.11
CVE-2014-3105
Medium
Sep 23, 2014
== 7.1.2.12
== 8.0.0.10
== 7.1.1.8
== 7.1.2.10
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.1.3
== 7.1.2
== 8.0.0.1
== 7.1.1.6
== 8.0.1.3
== 7.1.1.5
== 7.1.1
== 8.0
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 7.1.2.3
== 7.1.2.13
== 7.1.0.2
== 7.1.0.1
== 8.0.0.7
== 7.1.1.1
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 7.1
== 8.0.0.4
== 8.0.0.8
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 7.1.1.4
== 7.1.2.4
== 8.0.0.6
== 7.1.1.7
== 7.1.2.2
== 8.0.0.3
== 7.1.1.9
== 7.1.1.2
== 7.1.2.11
CVE-2014-3106
Medium
Sep 23, 2014
== 7.1.2.12
== 8.0.0.10
== 7.1.1.8
== 7.1.2.10
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.1.3
== 7.1.2
== 8.0.0.1
== 7.1.1.6
== 8.0.1.3
== 7.1.1.5
== 7.1.1
== 8.0
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 7.1.2.3
== 7.1.2.13
== 7.1.0.2
== 7.1.0.1
== 8.0.0.7
== 7.1.1.1
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 7.1
== 8.0.0.4
== 8.0.0.8
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 7.1.1.4
== 7.1.2.4
== 8.0.0.6
== 7.1.1.7
== 7.1.2.2
== 8.0.0.3
== 7.1.1.9
== 7.1.1.2
== 7.1.2.11
CVE-2014-3090
Medium
Sep 23, 2014
== 7.1.2.12
== 8.0.0.10
== 7.1.1.8
== 7.1.2.10
== 8.0.0.11
== 8.0.1.4
== 8.0.1.2
== 7.1.1.3
== 7.1.2
== 8.0.0.1
== 7.1.1.6
== 8.0.1.3
== 7.1.1.5
== 7.1.1
== 8.0
== 7.1.2.14
== 7.1.2.6
== 7.1.2.7
== 8.0.0.5
== 7.1.2.3
== 7.1.2.13
== 7.1.0.2
== 7.1.0.1
== 8.0.0.7
== 7.1.1.1
== 8.0.0.2
== 8.0.1.1
== 7.1.2.9
== 7.1
== 8.0.0.4
== 8.0.0.8
== 7.1.2.1
== 8.0.1
== 8.0.0.9
== 7.1.2.5
== 8.0.0
== 7.1.1.4
== 7.1.2.4
== 8.0.0.6
== 7.1.1.7
== 7.1.2.2
== 8.0.0.3
== 7.1.1.9
== 7.1.1.2
== 7.1.2.11
‹
›
‹
1
2
›