Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
ethereal Vendor: ethereal_group

About This Product

ethereal is a software product offered by ethereal_group. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 105 known vulnerabilities affecting ethereal_group ethereal. This includes 33 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 1999 to 2010, indicating a sustained research interest and ongoing security attention. 72 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0333 1999-05-31 2025-04-03 - 5.0 Likely
CVE-1999-1227 1999-07-30 2025-04-03 - 7.2 Unknown
CVE-2000-1174 2001-01-09 2025-04-03 - 7.5 Likely
CVE-2002-0402 2002-06-18 2025-04-03 - 7.5 Likely
CVE-2002-0403 2002-06-18 2025-04-03 - 5.0 Likely
CVE-2002-0404 2002-06-18 2025-04-03 - 5.0 Likely
CVE-2002-0353 2002-06-25 2025-04-03 - 5.0 Likely
CVE-2002-0821 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0822 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0834 2002-09-24 2025-04-03 - 7.5 Likely
CVE-2002-1355 2002-12-23 2025-04-03 - 5.0 Likely
CVE-2002-1356 2002-12-23 2025-04-03 - 7.5 Likely
CVE-2003-0081 2003-03-18 2025-04-03 - 7.5 Likely
CVE-2003-0159 2003-04-02 2025-04-03 - 7.5 Likely
CVE-2003-0357 2003-06-09 2025-04-03 - 7.5 Likely
CVE-2003-0428 2003-07-24 2025-04-03 - 5.0 Likely
CVE-2003-0429 2003-07-24 2025-04-03 - 7.5 Likely
CVE-2003-0430 2003-07-24 2025-04-03 - 5.0 Likely
CVE-2003-0431 2003-07-24 2025-04-03 - 10.0 Likely
CVE-2003-0432 2003-07-24 2025-04-03 - 10.0 Likely
CVE-2003-0925 2003-12-01 2025-04-03 - 7.5 Likely
CVE-2003-0926 2003-12-01 2025-04-03 - 5.0 Likely
CVE-2003-0927 2003-12-01 2025-04-03 - 7.5 Likely
CVE-2003-1012 2004-01-05 2025-04-03 - 5.0 Likely
CVE-2004-0176 2004-05-04 2025-04-03 - 5.0 Likely
CVE-2004-0367 2004-05-04 2025-04-03 - 5.0 Likely
CVE-2004-0504 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0505 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0506 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0507 2004-08-18 2025-04-03 - 10.0 Likely
CVE-2004-0633 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-0634 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-0635 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-1139 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1142 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1145 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1140 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1141 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1761 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2005-0699 2005-03-08 2025-04-03 - 7.5 Likely
CVE-2005-0765 2005-03-12 2025-04-03 - 5.0 Likely
CVE-2005-1281 2005-04-26 2025-04-03 - 5.0 Likely
CVE-2005-0006 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0007 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0008 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0009 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0010 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0084 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0704 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0705 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0739 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0766 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-1456 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1457 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1458 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1459 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1460 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1461 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1462 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1463 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1464 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1465 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1466 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1467 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1468 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1469 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1470 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-2360 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2361 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2362 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2363 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2364 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2365 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2366 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2367 2005-08-10 2025-04-03 - 7.5 Likely
CVE-2005-3184 2005-10-20 2025-04-03 - 10.0 Likely
CVE-2005-3241 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3242 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3243 2005-10-27 2025-04-03 - 7.5 Likely
CVE-2005-3244 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3245 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3246 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3247 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3248 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3249 2005-10-27 2025-04-03 - 6.4 Likely
CVE-2005-3313 2005-11-01 2025-04-03 - 5.0 Likely
CVE-2005-3651 2005-12-10 2025-04-03 - 7.5 Likely
CVE-2005-4585 2005-12-29 2025-04-03 - 7.8 Likely
CVE-2006-1932 2006-04-25 2025-04-03 - 10.0 Likely
CVE-2006-1933 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1934 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1935 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1936 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1937 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1938 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1939 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1940 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-3628 2006-07-21 2025-04-03 - 10.0 Likely
CVE-2006-3629 2006-07-21 2025-04-03 - 7.8 Likely
CVE-2006-3632 2006-07-21 2025-04-03 - 10.0 Likely
CVE-2007-6111 2007-11-23 2025-04-09 - 7.1 Likely
CVE-2007-6118 2007-11-23 2025-04-09 - 7.8 Likely
CVE-2007-6120 2007-11-23 2025-04-09 - 5.0 Likely
CVE-2007-6121 2007-11-23 2025-04-09 - 5.0 Likely
CVE-2010-1455 2010-05-12 2025-04-11 - 4.3 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ethereal_group ethereal by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.