Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

bea

About This Vendor

bea is a technology vendor producing software and infrastructure products. As a software provider, bea's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of bea's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 159 known vulnerabilities from bea. This includes 1 critical-severity issue and 42 high-severity issues that represent significant risk. These vulnerabilities affect 29 distinct products across bea's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2000 through 2010, indicating decades of continuous security attention and research. Organizations deploying bea products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0499 2000-06-08 2025-04-03 7.5 5.0 Likely
CVE-2000-0500 2000-06-21 2025-04-03 - 5.0 Likely
CVE-2000-0681 2000-10-20 2025-04-03 - 10.0 Likely
CVE-2000-0682 2000-10-20 2025-04-03 - 5.0 Likely
CVE-2000-0683 2000-10-20 2025-04-03 - 5.0 Likely
CVE-2000-0684 2000-10-20 2025-04-03 - 10.0 Likely
CVE-2000-0685 2000-10-20 2025-04-03 - 10.0 Likely
CVE-2000-1238 2000-12-31 2025-04-03 - 7.5 Likely
CVE-2001-0098 2001-02-12 2025-04-03 - 10.0 Likely
CVE-2001-1477 2001-12-31 2025-04-03 - 4.6 Unknown
CVE-2002-0106 2002-03-25 2025-04-03 - 5.0 Likely
CVE-2002-1030 2002-10-04 2025-04-03 - 2.6 Unknown
CVE-2002-2141 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2002-2142 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2002-2177 2002-12-31 2025-04-03 - 2.6 Unknown
CVE-2003-1095 2003-03-18 2025-04-03 - 4.6 Unknown
CVE-2003-0151 2003-03-24 2025-04-03 - 7.5 Likely
CVE-2003-0640 2003-08-27 2025-04-03 - 10.0 Likely
CVE-2003-0733 2003-10-20 2025-04-03 - 6.8 Likely
CVE-2003-0621 2003-12-01 2025-04-03 - 5.0 Likely
CVE-2003-0622 2003-12-01 2025-04-03 - 5.0 Likely
CVE-2003-0623 2003-12-01 2025-04-03 - 4.3 Likely
CVE-2003-0624 2003-12-01 2025-04-03 - 4.3 Likely
CVE-2003-1093 2003-12-31 2025-04-03 - 4.6 Unknown
CVE-2003-1094 2003-12-31 2025-04-03 - 7.2 Unknown
CVE-2003-1220 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1221 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1222 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1223 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1224 2003-12-31 2025-04-03 - 2.1 Unknown
CVE-2003-1225 2003-12-31 2025-04-03 - 2.1 Unknown
CVE-2003-1226 2003-12-31 2025-04-03 - 2.1 Unknown
CVE-2003-1290 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-1437 2003-12-31 2025-04-03 - 2.1 Unknown
CVE-2003-1438 2003-12-31 2025-04-03 - 4.3 Likely
CVE-2004-1756 2004-04-13 2025-04-03 - 5.0 Likely
CVE-2004-1758 2004-04-13 2025-04-03 - 4.6 Unknown
CVE-2004-0470 2004-07-07 2025-04-03 - 7.5 Likely
CVE-2004-0471 2004-07-07 2025-04-03 - 2.1 Unknown
CVE-2004-0711 2004-07-27 2025-04-03 - 7.5 Likely
CVE-2004-0712 2004-07-27 2025-04-03 - 4.6 Unknown
CVE-2004-0713 2004-07-27 2025-04-03 - 6.4 Likely
CVE-2004-0715 2004-07-27 2025-04-03 - 5.1 Unknown
CVE-2004-0204 2004-08-06 2025-04-03 - 7.5 Likely
CVE-2004-0652 2004-08-06 2025-04-03 - 7.2 Unknown
CVE-2004-1755 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-1757 2004-12-31 2025-04-03 - 4.6 Unknown
CVE-2004-2320 2004-12-31 2025-04-03 - 5.8 Likely
CVE-2004-2321 2004-12-31 2025-04-03 - 2.1 Unknown
CVE-2004-2424 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-2696 2004-12-31 2025-04-03 - 5.5 Likely
CVE-2005-0432 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-1380 2005-05-03 2025-04-03 - 6.8 Likely
CVE-2005-1742 2005-05-24 2025-04-03 - 5.0 Likely
CVE-2005-1743 2005-05-24 2025-04-03 - 7.5 Likely
CVE-2005-1744 2005-05-24 2025-04-03 9.8 7.5 Likely
CVE-2005-1745 2005-05-24 2025-04-03 - 4.6 Unknown
CVE-2005-1746 2005-05-24 2025-04-03 - 5.0 Likely
CVE-2005-1747 2005-05-24 2025-04-03 - 6.8 Likely
CVE-2005-1748 2005-05-24 2025-04-03 - 5.0 Likely
CVE-2005-1749 2005-05-24 2025-04-03 - 5.0 Likely
CVE-2005-2092 2005-07-05 2025-04-03 - 4.3 Likely
CVE-2005-4704 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4705 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4749 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4750 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4751 2005-12-31 2025-04-03 - 6.8 Likely
CVE-2005-4752 2005-12-31 2025-04-03 - 4.6 Unknown
CVE-2005-4753 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4754 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4755 2005-12-31 2025-04-03 - 2.1 Unknown
CVE-2005-4756 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4757 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4758 2005-12-31 2025-04-03 - 4.0 Likely
CVE-2005-4759 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-4760 2005-12-31 2025-04-03 - 5.1 Unknown
CVE-2005-4761 2005-12-31 2025-04-03 - 1.2 Unknown
CVE-2005-4762 2005-12-31 2025-04-03 - 7.2 Unknown
CVE-2005-4763 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4764 2005-12-31 2025-04-03 - 7.8 Likely
CVE-2005-4765 2005-12-31 2025-04-03 - 7.6 Unknown
CVE-2005-4766 2005-12-31 2025-04-03 - 5.4 Unknown
CVE-2005-4767 2005-12-31 2025-04-03 - 5.1 Unknown
CVE-2006-0419 2006-01-25 2025-04-03 - 6.4 Likely
CVE-2006-0420 2006-01-25 2025-04-03 - 5.0 Likely
CVE-2006-0421 2006-01-25 2025-04-03 - 4.6 Unknown
CVE-2006-0422 2006-01-25 2025-04-03 - 6.4 Likely
CVE-2006-0424 2006-01-25 2025-04-03 - 4.0 Likely
CVE-2006-0426 2006-01-25 2025-04-03 - 7.5 Likely
CVE-2006-0427 2006-01-25 2025-04-03 - 2.1 Unknown
CVE-2006-0429 2006-01-25 2025-04-03 - 2.1 Unknown
CVE-2006-0430 2006-01-25 2025-04-03 - 5.0 Likely
CVE-2006-0431 2006-01-25 2025-04-03 - 2.1 Unknown
CVE-2006-0432 2006-01-25 2025-04-03 - 2.1 Unknown
CVE-2006-1351 2006-03-22 2025-04-03 - 5.0 Likely
CVE-2006-1352 2006-03-22 2025-04-03 - 5.0 Likely
CVE-2006-2461 2006-05-19 2025-04-03 - 5.0 Likely
CVE-2006-2462 2006-05-19 2025-04-03 - 5.0 Likely
CVE-2006-2464 2006-05-19 2025-04-03 - 4.6 Unknown
CVE-2006-2466 2006-05-19 2025-04-03 - 2.6 Unknown
CVE-2006-2467 2006-05-19 2025-04-03 - 4.0 Likely
CVE-2006-2468 2006-05-19 2025-04-03 - 4.0 Likely
CVE-2006-2469 2006-05-19 2025-04-03 - 7.5 Likely
CVE-2006-2470 2006-05-19 2025-04-03 - 7.5 Likely
CVE-2006-2471 2006-05-19 2025-04-03 - 5.0 Likely
CVE-2006-2472 2006-05-19 2025-04-03 - 4.9 Unknown
CVE-2006-2546 2006-05-23 2025-04-03 - 5.0 Likely
CVE-2007-0408 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2007-0409 2007-01-23 2025-04-09 - 1.5 Unknown
CVE-2007-0410 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0411 2007-01-23 2025-04-09 - 6.8 Likely
CVE-2007-0412 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0413 2007-01-23 2025-04-09 - 4.4 Unknown
CVE-2007-0414 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0415 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0416 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2007-0417 2007-01-23 2025-04-09 - 10.0 Likely
CVE-2007-0418 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2007-0419 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0420 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0421 2007-01-23 2025-04-09 - 6.4 Likely
CVE-2007-0422 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0424 2007-01-23 2025-04-09 - 5.0 Likely
CVE-2007-0425 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2007-0432 2007-01-23 2025-04-09 - 7.5 Likely
CVE-2007-0433 2007-01-23 2025-04-09 - 6.5 Likely
CVE-2007-0434 2007-01-23 2025-04-09 - 4.6 Unknown
CVE-2007-2694 2007-05-16 2025-04-09 - 4.3 Likely
CVE-2007-2695 2007-05-16 2025-04-09 - 5.1 Unknown
CVE-2007-2696 2007-05-16 2025-04-09 - 6.8 Likely
CVE-2007-2697 2007-05-16 2025-04-09 - 5.1 Unknown
CVE-2007-2698 2007-05-16 2025-04-09 - 5.0 Likely
CVE-2007-2699 2007-05-16 2025-04-09 - 7.1 Unknown
CVE-2007-2700 2007-05-16 2025-04-09 - 4.0 Likely
CVE-2007-2701 2007-05-16 2025-04-09 - 4.6 Unknown
CVE-2007-2704 2007-05-16 2025-04-09 - 5.4 Unknown
CVE-2007-2705 2007-05-16 2025-04-09 - 7.8 Likely
CVE-2007-4613 2007-08-31 2025-04-09 - 6.8 Likely
CVE-2007-4614 2007-08-31 2025-04-09 - 7.5 Likely
CVE-2007-4615 2007-08-31 2025-04-09 - 6.4 Likely
CVE-2007-4616 2007-08-31 2025-04-09 - 6.4 Likely
CVE-2007-4617 2007-08-31 2025-04-09 - 7.8 Likely
CVE-2007-4618 2007-08-31 2025-04-09 - 7.8 Likely
CVE-2007-5576 2007-10-18 2025-04-09 - 6.8 Unknown
CVE-2007-6197 2007-12-01 2025-04-09 - 5.0 Likely
CVE-2007-6198 2007-12-01 2025-04-09 - 5.0 Likely
CVE-2007-6384 2007-12-15 2025-04-09 - 7.5 Likely
CVE-2008-0863 2008-02-21 2025-04-09 - 5.0 Likely
CVE-2008-0866 2008-02-21 2025-04-09 - 4.3 Likely
CVE-2008-0869 2008-02-21 2025-04-09 - 4.3 Likely
CVE-2008-0895 2008-02-22 2025-04-09 - 6.4 Likely
CVE-2008-0897 2008-02-22 2025-04-09 - 7.9 Unknown
CVE-2008-0898 2008-02-22 2025-04-09 - 5.8 Likely
CVE-2008-0899 2008-02-22 2025-04-09 - 4.3 Likely
CVE-2008-0900 2008-02-22 2025-04-09 - 6.0 Unknown
CVE-2008-0901 2008-02-22 2025-04-09 - 7.1 Likely
CVE-2008-0902 2008-02-22 2025-04-09 - 4.3 Likely
CVE-2008-3257 2008-07-22 2025-04-09 - 10.0 Likely
CVE-2010-2375 2010-07-13 2025-04-11 - 6.4 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for bea by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with bea's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.