Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

bsdi

About This Vendor

bsdi is a technology vendor producing software and infrastructure products. As a software provider, bsdi's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of bsdi's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 39 known vulnerabilities from bsdi. This includes 1 critical-severity issue and 26 high-severity issues that represent significant risk. These vulnerabilities affect 62 distinct products across bsdi's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1995 through 2008, indicating decades of continuous security attention and research. Organizations deploying bsdi products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0099 1995-10-19 2025-04-03 - 10.0 Likely
CVE-1999-0078 1996-04-18 2025-04-03 - 1.9 Unknown
CVE-1999-0022 1996-07-03 2025-04-03 7.8 7.2 Unknown
CVE-1999-0023 1996-07-24 2025-04-03 - 7.2 Unknown
CVE-1999-0131 1996-09-11 2025-04-03 - 7.2 Unknown
CVE-1999-0032 1996-10-25 2025-04-03 - 7.2 Unknown
CVE-1999-0130 1996-11-16 2025-04-03 - 7.2 Unknown
CVE-1999-0129 1996-12-03 2025-04-03 - 4.6 Unknown
CVE-1999-0043 1996-12-04 2025-04-03 9.8 10.0 Likely
CVE-1999-0096 1996-12-10 2025-04-03 - 5.0 Likely
CVE-1999-0297 1996-12-12 2025-04-03 - 7.2 Unknown
CVE-1999-0047 1997-01-28 2025-04-03 - 10.0 Likely
CVE-1999-0046 1997-02-06 2025-04-03 - 10.0 Likely
CVE-1999-0165 1997-03-01 2025-04-03 - 10.0 Likely
CVE-1999-0042 1997-04-07 2025-04-03 - 10.0 Likely
CVE-1999-0038 1997-04-26 2025-04-03 8.4 7.2 Unknown
CVE-1999-0040 1997-05-01 2025-04-03 - 7.2 Unknown
CVE-1999-0034 1997-05-29 2025-04-03 - 7.2 Unknown
CVE-1999-0024 1997-08-13 2025-04-03 - 5.0 Likely
CVE-1999-0061 1997-10-02 2025-04-03 - 5.1 Unknown
CVE-1999-0304 1998-02-01 2025-04-03 - 7.2 Unknown
CVE-1999-0305 1998-02-01 2025-04-03 - 5.0 Likely
CVE-1999-0323 1998-02-20 2025-04-03 - 10.0 Likely
CVE-1999-0009 1998-04-08 2025-04-03 - 10.0 Likely
CVE-1999-0002 1998-10-12 2025-04-03 - 10.0 Likely
CVE-1999-0052 1998-11-04 2025-04-03 7.5 5.0 Likely
CVE-1999-0798 1998-12-04 2025-04-03 - 10.0 Likely
CVE-1999-0703 1999-08-03 2025-04-03 - 3.6 Unknown
CVE-1999-0747 1999-08-18 2025-04-03 - 2.1 Unknown
CVE-1999-0704 1999-09-16 2025-04-03 - 9.3 Likely
CVE-1999-0879 1999-10-01 2025-04-03 - 10.0 Likely
CVE-1999-0880 1999-10-01 2025-04-03 - 5.0 Likely
CVE-1999-1047 1999-10-18 2025-04-03 - 7.5 Likely
CVE-1999-0001 1999-12-30 2025-04-03 - 5.0 Likely
CVE-2000-1103 2001-01-09 2025-04-03 - 7.2 Unknown
CVE-2001-1133 2001-08-21 2025-04-03 - 2.1 Unknown
CVE-2001-1154 2001-08-30 2025-04-03 - 5.0 Likely
CVE-2001-1541 2001-12-31 2025-04-03 - 7.2 Unknown
CVE-2008-4609 2008-10-20 2025-04-09 - 7.1 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for bsdi by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with bsdi's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.