Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
cups Vendor: apple

About This Product

cups is a software product developed by apple, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 56 known vulnerabilities affecting apple cups. This includes 3 critical-severity issues and 14 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2002 to 2022, indicating a sustained research interest and ongoing security attention. 33 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-1372 2002-12-26 2025-04-03 7.5 5.0 Likely
CVE-2004-2154 2004-12-31 2025-04-03 9.8 7.5 Likely
CVE-2007-4045 2007-07-27 2025-04-09 - 5.0 Likely
CVE-2007-3387 2007-07-30 2025-04-09 - 6.8 Likely
CVE-2008-0053 2008-03-18 2025-04-09 - 10.0 Likely
CVE-2008-1374 2008-04-04 2025-04-09 - 6.8 Likely
CVE-2008-1033 2008-06-02 2025-04-09 - 2.1 Unknown
CVE-2008-3641 2008-10-10 2025-04-09 - 10.0 Likely
CVE-2008-3639 2008-10-14 2025-04-09 - 7.5 Likely
CVE-2008-3640 2008-10-14 2025-04-09 - 6.8 Likely
CVE-2008-5183 2008-11-21 2025-04-09 7.5 4.3 Likely
CVE-2008-5184 2008-11-21 2025-04-09 - 10.0 Likely
CVE-2008-5286 2008-12-01 2025-04-09 - 7.5 Likely
CVE-2008-5377 2008-12-08 2025-04-09 - 6.9 Unknown
CVE-2009-0032 2009-01-27 2025-04-09 - 6.9 Unknown
CVE-2009-0577 2009-02-20 2025-04-09 - 6.8 Likely
CVE-2009-0146 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-0147 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-0163 2009-04-23 2025-04-09 - 6.8 Likely
CVE-2009-0166 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-0195 2009-04-23 2025-04-09 - 6.8 Likely
CVE-2009-0799 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-0800 2009-04-23 2025-04-09 - 6.8 Likely
CVE-2009-1179 2009-04-23 2025-04-09 - 6.8 Likely
CVE-2009-1180 2009-04-23 2025-04-09 - 6.8 Likely
CVE-2009-1181 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-1182 2009-04-23 2025-04-09 - 7.5 Likely
CVE-2009-1183 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-0164 2009-04-24 2025-04-09 - 6.4 Likely
CVE-2009-0791 2009-06-09 2025-04-09 - 6.8 Likely
CVE-2009-0949 2009-06-09 2025-04-09 7.5 5.0 Likely
CVE-2009-1196 2009-06-09 2025-04-09 - 5.0 Likely
CVE-2009-3553 2009-11-20 2025-04-09 7.5 5.0 Likely
CVE-2010-0302 2010-03-05 2025-04-11 7.5 4.3 Likely
CVE-2010-0393 2010-03-05 2025-04-11 - 6.9 Unknown
CVE-2010-1748 2010-06-17 2025-04-11 - 4.3 Likely
CVE-2010-0542 2010-06-21 2025-04-11 - 6.8 Likely
CVE-2010-2431 2010-06-22 2025-04-11 - 2.6 Unknown
CVE-2010-2432 2010-06-22 2025-04-11 - 5.0 Likely
CVE-2010-2941 2010-11-05 2025-04-11 9.8 9.3 Likely
CVE-2010-3702 2010-11-05 2025-04-11 - 7.5 Likely
CVE-2011-2896 2011-08-19 2025-04-11 - 5.1 Unknown
CVE-2011-3170 2011-08-19 2025-04-11 - 5.1 Unknown
CVE-2012-5519 2012-11-20 2025-04-11 - 7.2 Unknown
CVE-2013-6891 2014-01-26 2025-04-11 - 1.2 Unknown
CVE-2014-2856 2014-04-18 2025-04-12 - 4.3 Likely
CVE-2014-3537 2014-07-23 2025-04-12 - 1.2 Unknown
CVE-2014-5029 2014-07-29 2025-04-12 - 1.5 Unknown
CVE-2014-5030 2014-07-29 2025-04-12 - 1.9 Unknown
CVE-2014-5031 2014-07-29 2025-04-12 - 5.0 Likely
CVE-2014-9679 2015-02-19 2025-04-12 - 6.8 Likely
CVE-2017-18190 2018-02-16 2024-11-21 7.5 5.0 Likely
CVE-2017-18248 2018-03-26 2024-11-21 5.3 3.5 Unknown
CVE-2018-4300 2019-04-03 2024-11-21 5.9 4.3 Likely
CVE-2012-6094 2019-12-20 2024-11-21 9.8 6.8 Likely
CVE-2022-26691 2022-05-26 2024-11-21 6.7 7.2 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for apple cups by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.