Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 309,540
With exploit
icewarp / webmail_server
You can search for specific versions with
https://synscan.net/product/webmail_server/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2009-1467
Low
May 5, 2009
== 4.2.1
== 6.0.7
== 7.6.4
== 7.1.4
== 3.00.140
== 5.5.7
== 2.10.320
== 6.0.3
== 5.8.6
== 8.5.0
== 5.9.4
== 3.00.130
== 5.8.2
== 7.4.2
== 4.10.040
== 5.1.2
== 5.5.4
== 2.10.210
== 5.7.3
== 9.1.0
== 5.5.3
== 2.10.330
== 8.0.2
== 8.2.2
== 2.10.280
== 7.4.5
== 2.10.250
== 2.10.150
== 5.4.1
== 3.10.011
== 7.0.1
== 5.4.4
== 2.10.165
== 5.4.2
== 2.10.360
== 2.10.105
== 2.10.200
<= 9.3.0
== 3.10.110
== 5.3.2
== 6.2.1
== 2.10.170
== 7.2.0
== 3.00.120
== 5.5.6
== 4.2.3
== 6.0.5
== 2.10.240
== 3.00.100
== 4.00.30
== 2.10.190
== 7.6.0
== 2.10.140
== 2.10.290
== 5.4.3
== 6.1.0
== 5.8.4
== 2.10.331
== 5.8.3
== 4.4.1
== 7.1.6
== 2.10.310
== 9.2.0
== 8.0.1
== 7.4.0
== 2.10.110
== 2.10.350
== 7.5.2
== 5.8.5
== 5.5.5
== 5.1.5
== 4.10.050
== 8.0.3
== 8.2.0
== 2.10.220
== 8.9.1
== 8.3.8
== 2.10.115
== 6.0.2
== 2.10.340
== 2.10.260
== 9.0.0
== 8.3.5
== 5.3.0
== 3.00.110
== 4.4.2
== 4.2.2
== 5.1.3
CVE-2009-1468
Medium
May 5, 2009
== 4.2.1
== 6.0.7
== 7.6.4
== 7.1.4
== 3.00.140
== 5.5.7
== 2.10.320
== 6.0.3
== 5.8.6
== 8.5.0
== 5.9.4
== 3.00.130
== 5.8.2
== 7.4.2
== 4.10.040
== 5.1.2
== 5.5.4
== 2.10.210
== 5.7.3
== 9.1.0
== 5.5.3
== 2.10.330
== 8.0.2
== 8.2.2
== 2.10.280
== 7.4.5
== 2.10.250
== 2.10.150
== 5.4.1
== 3.10.011
== 7.0.1
== 5.4.4
== 2.10.165
== 5.4.2
== 2.10.360
== 2.10.105
== 2.10.200
<= 9.3.0
== 3.10.110
== 5.3.2
== 6.2.1
== 2.10.170
== 7.2.0
== 3.00.120
== 5.5.6
== 4.2.3
== 6.0.5
== 2.10.240
== 3.00.100
== 4.00.30
== 2.10.190
== 7.6.0
== 2.10.140
== 2.10.290
== 5.4.3
== 6.1.0
== 5.8.4
== 2.10.331
== 5.8.3
== 4.4.1
== 7.1.6
== 2.10.310
== 9.2.0
== 8.0.1
== 7.4.0
== 2.10.110
== 2.10.350
== 7.5.2
== 5.8.5
== 5.5.5
== 5.1.5
== 4.10.050
== 8.0.3
== 8.2.0
== 2.10.220
== 8.9.1
== 8.3.8
== 2.10.115
== 6.0.2
== 2.10.340
== 2.10.260
== 9.0.0
== 8.3.5
== 5.3.0
== 3.00.110
== 4.4.2
== 4.2.2
== 5.1.3
CVE-2009-1469
Low
May 5, 2009
== 4.2.1
== 6.0.7
== 7.6.4
== 7.1.4
== 3.00.140
== 5.5.7
== 2.10.320
== 6.0.3
== 5.8.6
== 8.5.0
== 5.9.4
== 3.00.130
== 5.8.2
== 7.4.2
== 4.10.040
== 5.1.2
== 5.5.4
== 2.10.210
== 5.7.3
== 9.1.0
== 5.5.3
== 2.10.330
== 8.0.2
== 8.2.2
== 2.10.280
== 7.4.5
== 2.10.250
== 2.10.150
== 5.4.1
== 3.10.011
== 7.0.1
== 5.4.4
== 2.10.165
== 5.4.2
== 2.10.360
== 2.10.105
== 2.10.200
<= 9.3.0
== 3.10.110
== 5.3.2
== 6.2.1
== 2.10.170
== 7.2.0
== 3.00.120
== 5.5.6
== 4.2.3
== 6.0.5
== 2.10.240
== 3.00.100
== 4.00.30
== 2.10.190
== 7.6.0
== 2.10.140
== 2.10.290
== 5.4.3
== 6.1.0
== 5.8.4
== 2.10.331
== 5.8.3
== 4.4.1
== 7.1.6
== 2.10.310
== 9.2.0
== 8.0.1
== 7.4.0
== 2.10.110
== 2.10.350
== 7.5.2
== 5.8.5
== 5.5.5
== 5.1.5
== 4.10.050
== 8.0.3
== 8.2.0
== 2.10.220
== 8.9.1
== 8.3.8
== 2.10.115
== 6.0.2
== 2.10.340
== 2.10.260
== 9.0.0
== 8.3.5
== 5.3.0
== 3.00.110
== 4.4.2
== 4.2.2
== 5.1.3