Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
office Vendor: cybozu

About This Product

office is a software product offered by cybozu. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 71 known vulnerabilities affecting cybozu office. This includes 5 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2011 to 2024, indicating a sustained research interest and ongoing security attention. 65 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-1333 2011-06-29 2025-04-11 - 4.3 Likely
CVE-2011-1334 2011-06-29 2025-04-11 - 4.3 Likely
CVE-2011-1335 2011-06-29 2025-04-11 - 4.3 Likely
CVE-2011-2677 2011-10-21 2025-04-11 - 5.5 Likely
CVE-2013-4703 2013-09-10 2025-04-11 - 4.3 Likely
CVE-2014-5314 2014-11-24 2025-04-12 - 9.0 Likely
CVE-2015-7795 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2015-7796 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2015-7797 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2015-7798 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2015-8483 2016-02-17 2025-04-12 7.4 5.8 Likely
CVE-2015-8484 2016-02-17 2025-04-12 5.4 5.5 Likely
CVE-2015-8485 2016-02-17 2025-04-12 5.4 5.5 Likely
CVE-2015-8486 2016-02-17 2025-04-12 5.4 5.5 Likely
CVE-2015-8487 2016-02-17 2025-04-12 4.3 2.6 Unknown
CVE-2015-8488 2016-02-17 2025-04-12 4.3 4.3 Likely
CVE-2015-8489 2016-02-17 2025-04-12 6.5 6.8 Likely
CVE-2016-1149 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2016-1150 2016-02-17 2025-04-12 6.1 4.3 Likely
CVE-2016-1151 2016-02-17 2025-04-12 8.8 6.8 Likely
CVE-2016-1152 2016-02-17 2025-04-12 5.4 5.5 Likely
CVE-2016-1153 2016-02-17 2025-04-12 6.5 6.8 Likely
CVE-2016-4865 2017-04-17 2025-04-20 4.8 3.5 Unknown
CVE-2016-4866 2017-04-17 2025-04-20 4.8 3.5 Unknown
CVE-2016-4867 2017-04-17 2025-04-20 4.3 4.0 Likely
CVE-2016-4868 2017-04-17 2025-04-20 4.3 4.3 Likely
CVE-2016-4869 2017-04-17 2025-04-20 6.5 4.3 Likely
CVE-2016-4870 2017-04-17 2025-04-20 5.4 3.5 Unknown
CVE-2016-4871 2017-04-17 2025-04-20 6.5 6.8 Likely
CVE-2016-4872 2017-04-17 2025-04-20 4.3 4.0 Likely
CVE-2016-4873 2017-04-17 2025-04-20 4.3 4.0 Likely
CVE-2016-4874 2017-04-17 2025-04-20 3.5 3.5 Unknown
CVE-2017-2114 2017-04-28 2025-04-20 5.4 3.5 Unknown
CVE-2017-2115 2017-04-28 2025-04-20 4.3 4.0 Likely
CVE-2017-2116 2017-04-28 2025-04-20 4.3 4.0 Likely
CVE-2017-10857 2017-10-12 2025-04-20 4.3 4.0 Likely
CVE-2018-0526 2018-06-26 2024-11-21 4.3 4.3 Likely
CVE-2018-0527 2018-06-26 2024-11-21 6.1 4.3 Likely
CVE-2018-0528 2018-06-26 2024-11-21 4.3 4.0 Likely
CVE-2018-0529 2018-06-26 2024-11-21 4.3 4.3 Likely
CVE-2018-0565 2018-06-26 2024-11-21 6.1 4.3 Likely
CVE-2018-0566 2018-06-26 2024-11-21 4.3 4.0 Likely
CVE-2018-0567 2018-06-26 2024-11-21 6.3 6.5 Likely
CVE-2018-0703 2019-01-09 2024-11-21 7.5 6.4 Likely
CVE-2018-0704 2019-01-09 2024-11-21 7.5 6.4 Likely
CVE-2019-6022 2019-12-26 2024-11-21 6.5 4.0 Likely
CVE-2019-6023 2019-12-26 2024-11-21 4.3 4.0 Likely
CVE-2021-20624 2021-03-18 2024-11-21 6.5 4.0 Likely
CVE-2021-20625 2021-03-18 2024-11-21 4.3 4.0 Likely
CVE-2021-20626 2021-03-18 2024-11-21 6.5 4.0 Likely
CVE-2021-20627 2021-03-18 2024-11-21 6.1 4.3 Likely
CVE-2021-20628 2021-03-18 2024-11-21 6.1 4.3 Likely
CVE-2021-20629 2021-03-18 2024-11-21 6.1 4.3 Likely
CVE-2021-20630 2021-03-18 2024-11-21 4.3 4.0 Likely
CVE-2021-20631 2021-03-18 2024-11-21 6.5 4.0 Likely
CVE-2021-20632 2021-03-18 2024-11-21 4.3 4.0 Likely
CVE-2021-20633 2021-03-18 2024-11-21 4.3 4.0 Likely
CVE-2021-20634 2021-03-18 2024-11-21 4.3 4.0 Likely
CVE-2022-25986 2022-08-18 2024-11-21 4.3 - -
CVE-2022-28715 2022-08-18 2024-11-21 6.1 - -
CVE-2022-29487 2022-08-18 2024-11-21 6.1 - -
CVE-2022-29891 2022-08-18 2024-11-21 4.3 - -
CVE-2022-30604 2022-08-18 2024-11-21 6.1 - -
CVE-2022-30693 2022-08-18 2024-11-21 5.3 - -
CVE-2022-32283 2022-08-18 2024-11-21 4.3 - -
CVE-2022-32453 2022-08-18 2024-11-21 6.5 - -
CVE-2022-32544 2022-08-18 2024-11-21 4.3 - -
CVE-2022-32583 2022-08-18 2024-11-21 4.3 - -
CVE-2022-33151 2022-08-18 2024-11-21 6.1 - -
CVE-2022-33311 2022-08-18 2024-11-21 4.3 - -
CVE-2024-39817 2024-08-06 2025-03-18 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for cybozu office by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.