Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
iccdev Vendor: color

About This Product

iccdev is a software product offered by color. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 104 known vulnerabilities affecting color iccdev. This includes 1 critical-severity issue and 48 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2026 to 2026, indicating a recent active security attention. 54 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2026-21507 2026-01-06 2026-01-12 7.5 - -
CVE-2026-21673 2026-01-06 2026-01-12 7.8 - -
CVE-2026-21674 2026-01-06 2026-01-12 3.3 - -
CVE-2026-21675 2026-01-06 2026-01-12 9.8 - -
CVE-2026-21485 2026-01-06 2026-01-14 8.8 - -
CVE-2026-21486 2026-01-06 2026-01-12 7.8 - -
CVE-2026-21487 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21676 2026-01-06 2026-01-12 8.8 - -
CVE-2026-21677 2026-01-06 2026-01-12 8.8 - -
CVE-2026-21488 2026-01-06 2026-01-14 6.1 - -
CVE-2026-21489 2026-01-06 2026-01-14 6.1 - -
CVE-2026-21493 2026-01-06 2026-01-14 6.6 - -
CVE-2026-21490 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21491 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21494 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21492 2026-01-06 2026-01-12 5.5 - -
CVE-2026-21495 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21496 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21497 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21498 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21499 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21500 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21501 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21502 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21503 2026-01-07 2026-01-09 6.1 - -
CVE-2026-21504 2026-01-07 2026-01-09 6.6 - -
CVE-2026-21505 2026-01-07 2026-01-12 5.5 - -
CVE-2026-21506 2026-01-07 2026-01-13 5.5 - -
CVE-2026-21678 2026-01-07 2026-01-13 7.8 - -
CVE-2026-21679 2026-01-07 2026-01-09 8.8 - -
CVE-2026-21680 2026-01-07 2026-01-09 6.5 - -
CVE-2026-21681 2026-01-07 2026-01-14 7.1 - -
CVE-2026-21682 2026-01-07 2026-01-14 8.8 - -
CVE-2026-21683 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21684 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21685 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21686 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21687 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21688 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21689 2026-01-07 2026-01-12 6.5 - -
CVE-2026-21690 2026-01-07 2026-01-12 6.3 - -
CVE-2026-21691 2026-01-07 2026-01-12 5.4 - -
CVE-2026-21692 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21693 2026-01-07 2026-01-12 8.8 - -
CVE-2026-22046 2026-01-07 2026-01-14 8.8 - -
CVE-2026-22047 2026-01-07 2026-01-14 8.8 - -
CVE-2026-22255 2026-01-08 2026-01-14 8.8 - -
CVE-2026-22861 2026-01-13 2026-01-16 8.8 - -
CVE-2026-24403 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24404 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24405 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24406 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24407 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24409 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24410 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24411 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24412 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24852 2026-01-28 2026-02-03 6.1 - -
CVE-2026-24856 2026-01-28 2026-02-03 7.8 - -
CVE-2026-25502 2026-02-03 2026-02-10 7.8 - -
CVE-2026-25503 2026-02-03 2026-02-10 7.1 - -
CVE-2026-25582 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25583 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25584 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25585 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25634 2026-02-06 2026-02-19 7.8 - -
CVE-2026-27691 2026-02-25 2026-02-26 6.2 - -
CVE-2026-27692 2026-02-25 2026-02-26 7.1 - -
CVE-2026-30978 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30979 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30980 2026-03-10 2026-03-13 5.5 - -
CVE-2026-30981 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30982 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30983 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30984 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30985 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30986 2026-03-10 2026-03-13 5.5 - -
CVE-2026-30987 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31792 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31793 2026-03-10 2026-03-13 5.5 - -
CVE-2026-31794 2026-03-10 2026-03-13 5.5 - -
CVE-2026-31795 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31796 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31797 2026-03-10 2026-03-13 6.1 - -
CVE-2026-34533 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34534 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34535 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34536 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34537 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34539 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34540 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34541 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34542 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34546 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34547 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34548 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34549 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34550 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34551 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34552 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34553 2026-03-31 2026-04-20 4.0 - -
CVE-2026-34554 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34555 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34556 2026-03-31 2026-04-20 6.2 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for color iccdev by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.