Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

cloudfoundry

About This Vendor

cloudfoundry is a technology vendor producing software and infrastructure products. As a software provider, cloudfoundry's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of cloudfoundry's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 109 known vulnerabilities from cloudfoundry. This includes 11 critical-severity issues and 54 high-severity issues that represent significant risk. These vulnerabilities affect 49 distinct products across cloudfoundry's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2016 through 2026, indicating decades of continuous security attention and research. Organizations deploying cloudfoundry products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2016-6639 2016-09-18 2025-04-12 7.5 5.0 Likely
CVE-2016-6636 2016-09-30 2025-04-12 5.3 5.0 Likely
CVE-2016-6637 2016-09-30 2025-04-12 9.6 6.8 Likely
CVE-2016-6651 2016-09-30 2025-04-12 8.8 6.5 Likely
CVE-2016-6659 2016-12-23 2025-04-12 8.1 2.6 Unknown
CVE-2016-9882 2017-01-13 2025-04-20 7.5 5.0 Likely
CVE-2017-4960 2017-03-10 2025-04-20 7.5 5.0 Likely
CVE-2017-4964 2017-04-06 2025-04-20 8.8 4.6 Unknown
CVE-2016-4468 2017-04-11 2025-04-20 8.8 6.5 Likely
CVE-2017-4969 2017-04-20 2025-04-20 6.5 6.8 Likely
CVE-2015-1834 2017-05-25 2025-04-20 6.5 4.0 Likely
CVE-2015-3189 2017-05-25 2025-04-20 3.7 4.3 Likely
CVE-2015-3190 2017-05-25 2025-04-20 6.1 5.8 Likely
CVE-2015-3191 2017-05-25 2025-04-20 8.8 6.8 Likely
CVE-2016-0761 2017-05-25 2025-04-20 9.8 10.0 Likely
CVE-2016-0780 2017-05-25 2025-04-20 7.5 5.0 Likely
CVE-2016-0781 2017-05-25 2025-04-20 6.1 4.3 Likely
CVE-2016-2165 2017-05-25 2025-04-20 6.5 4.3 Likely
CVE-2016-3084 2017-05-25 2025-04-20 8.1 4.3 Likely
CVE-2016-6655 2017-06-13 2025-04-20 9.8 7.5 Likely
CVE-2016-8218 2017-06-13 2025-04-20 9.8 7.5 Likely
CVE-2016-8219 2017-06-13 2025-04-20 6.5 4.0 Likely
CVE-2017-4970 2017-06-13 2025-04-20 5.9 4.3 Likely
CVE-2017-4972 2017-06-13 2025-04-20 7.5 5.0 Likely
CVE-2017-4973 2017-06-13 2025-04-20 8.8 6.5 Likely
CVE-2017-4974 2017-06-13 2025-04-20 6.5 4.0 Likely
CVE-2017-4991 2017-06-13 2025-04-20 7.2 6.5 Likely
CVE-2017-4992 2017-06-13 2025-04-20 9.8 7.5 Likely
CVE-2017-4994 2017-06-13 2025-04-20 7.5 5.0 Likely
CVE-2017-8032 2017-07-10 2025-04-20 6.6 6.0 Unknown
CVE-2017-8034 2017-07-17 2025-04-20 6.6 6.0 Unknown
CVE-2017-8036 2017-07-24 2025-04-20 7.8 6.8 Likely
CVE-2017-8033 2017-07-25 2025-04-20 7.8 6.8 Likely
CVE-2017-8035 2017-07-25 2025-04-20 7.5 5.0 Likely
CVE-2017-8037 2017-08-21 2025-04-20 7.5 5.0 Likely
CVE-2016-0713 2017-08-31 2025-04-20 4.7 2.6 Unknown
CVE-2016-0732 2017-09-07 2025-04-20 8.8 6.5 Likely
CVE-2017-8047 2017-10-04 2025-04-20 6.1 5.8 Likely
CVE-2017-8048 2017-10-04 2025-04-20 7.8 6.8 Likely
CVE-2015-5170 2017-10-24 2025-04-20 8.8 6.8 Likely
CVE-2015-5171 2017-10-24 2025-04-20 9.8 7.5 Likely
CVE-2015-5172 2017-10-24 2025-04-20 9.8 7.5 Likely
CVE-2015-5173 2017-10-24 2025-04-20 8.8 6.8 Likely
CVE-2017-8031 2017-11-27 2025-04-20 5.3 3.5 Unknown
CVE-2017-14389 2017-11-28 2025-04-20 6.5 4.0 Likely
CVE-2018-1190 2018-01-04 2024-11-21 6.1 4.3 Likely
CVE-2015-5350 2018-03-19 2024-11-21 7.5 5.0 Likely
CVE-2018-1195 2018-03-19 2024-11-21 8.8 6.5 Likely
CVE-2018-1221 2018-03-19 2024-11-21 8.1 5.5 Likely
CVE-2018-1266 2018-03-27 2024-11-21 8.1 6.5 Likely
CVE-2018-1267 2018-03-27 2024-11-21 8.1 6.8 Likely
CVE-2018-1191 2018-03-29 2024-11-21 8.8 3.5 Unknown
CVE-2016-6658 2018-03-29 2024-11-21 9.6 4.0 Likely
CVE-2016-2169 2018-04-18 2024-11-21 5.3 5.0 Likely
CVE-2018-1277 2018-04-30 2024-11-21 6.5 4.0 Likely
CVE-2018-1262 2018-05-15 2024-11-21 7.2 6.5 Likely
CVE-2018-1193 2018-05-23 2024-11-21 5.3 5.0 Likely
CVE-2018-1265 2018-06-06 2024-11-21 7.2 6.5 Likely
CVE-2018-1268 2018-06-06 2024-11-21 6.8 4.9 Unknown
CVE-2018-1269 2018-06-06 2024-11-21 6.5 4.0 Likely
CVE-2016-0708 2018-07-11 2024-11-21 5.9 4.3 Likely
CVE-2018-11084 2018-09-18 2024-11-21 6.8 5.5 Likely
CVE-2019-3782 2019-02-13 2024-11-21 7.8 2.1 Unknown
CVE-2019-3775 2019-03-07 2024-11-21 7.1 4.0 Likely
CVE-2019-3781 2019-03-07 2024-11-21 8.8 3.5 Unknown
CVE-2019-3783 2019-03-07 2024-11-21 8.8 4.0 Likely
CVE-2019-3784 2019-03-07 2024-11-21 8.2 4.0 Likely
CVE-2019-3779 2019-03-08 2024-11-21 8.8 4.0 Likely
CVE-2019-3780 2019-03-08 2024-11-21 8.8 6.5 Likely
CVE-2019-3785 2019-03-13 2024-11-21 8.1 5.5 Likely
CVE-2019-3798 2019-04-17 2024-11-21 6.0 6.0 Unknown
CVE-2019-3786 2019-04-24 2024-11-21 7.1 4.0 Likely
CVE-2019-3789 2019-04-24 2024-11-21 6.5 4.0 Likely
CVE-2019-3788 2019-04-25 2024-11-21 8.7 5.8 Likely
CVE-2019-3801 2019-04-25 2024-11-21 9.8 5.0 Likely
CVE-2019-11274 2019-08-09 2024-11-21 6.1 4.3 Likely
CVE-2019-11277 2019-09-23 2024-11-21 8.1 5.5 Likely
CVE-2019-11278 2019-09-26 2024-11-21 8.8 6.5 Likely
CVE-2019-11279 2019-09-26 2024-11-21 8.8 6.5 Likely
CVE-2019-11282 2019-10-23 2024-11-21 4.3 4.0 Likely
CVE-2019-11283 2019-10-23 2024-11-21 8.8 4.0 Likely
CVE-2019-11289 2019-11-19 2024-11-21 8.6 7.8 Likely
CVE-2019-11290 2019-11-26 2024-11-21 7.5 5.0 Likely
CVE-2019-11293 2019-12-06 2024-11-21 6.5 3.5 Unknown
CVE-2019-11294 2019-12-19 2024-11-21 4.3 4.0 Likely
CVE-2020-5399 2020-02-12 2024-11-21 7.4 5.8 Likely
CVE-2020-5400 2020-02-27 2024-11-21 6.5 4.0 Likely
CVE-2020-5401 2020-02-27 2024-11-21 5.3 5.0 Likely
CVE-2020-5402 2020-02-27 2024-11-21 8.8 6.8 Likely
CVE-2020-15586 2020-07-17 2024-11-21 5.9 4.3 Likely
CVE-2020-5416 2020-08-21 2024-11-21 6.5 4.0 Likely
CVE-2020-5417 2020-08-21 2024-11-21 8.8 6.5 Likely
CVE-2020-5418 2020-09-03 2024-11-21 4.3 4.0 Likely
CVE-2020-5420 2020-09-03 2024-11-21 7.7 6.8 Likely
CVE-2020-5423 2020-12-02 2024-11-21 7.5 7.8 Likely
CVE-2021-22115 2021-04-08 2024-11-21 6.5 4.0 Likely
CVE-2021-22001 2021-07-22 2024-11-21 7.5 5.0 Likely
CVE-2021-22098 2021-08-11 2024-11-21 6.1 5.8 Likely
CVE-2021-22101 2021-10-27 2024-11-21 7.5 5.0 Likely
CVE-2021-22100 2022-03-25 2024-11-21 5.3 5.0 Likely
CVE-2018-25046 2022-12-27 2025-04-11 9.1 - -
CVE-2022-31733 2023-02-03 2025-03-25 9.1 - -
CVE-2023-20903 2023-03-28 2025-02-19 4.3 - -
CVE-2023-20881 2023-05-19 2025-01-21 8.1 - -
CVE-2023-20882 2023-05-26 2025-01-16 5.9 - -
CVE-2023-34041 2023-09-08 2024-11-21 5.3 - -
CVE-2024-22279 2024-06-10 2024-11-21 5.9 - -
CVE-2025-22246 2025-05-13 2025-07-11 3.0 - -
CVE-2026-22723 2026-03-05 2026-03-17 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for cloudfoundry by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with cloudfoundry's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.