Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

color

About This Vendor

color is a technology vendor producing software and infrastructure products. As a software provider, color's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of color's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 112 known vulnerabilities from color. This includes 1 critical-severity issue and 51 high-severity issues that represent significant risk. These vulnerabilities affect 6 distinct products across color's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2012 through 2026, indicating decades of continuous security attention and research. Organizations deploying color products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-1616 2012-06-21 2025-04-11 - 9.3 Likely
CVE-2012-4405 2012-09-18 2025-04-11 - 6.8 Likely
CVE-2023-46602 2023-10-23 2024-11-21 8.8 - -
CVE-2023-46603 2023-10-23 2024-11-21 8.8 - -
CVE-2023-46866 2023-10-30 2024-11-21 6.5 - -
CVE-2023-46867 2023-10-30 2024-11-21 6.5 - -
CVE-2023-47249 2023-11-05 2024-11-21 6.5 - -
CVE-2023-48736 2023-11-18 2024-11-21 6.5 - -
CVE-2026-21507 2026-01-06 2026-01-12 7.5 - -
CVE-2026-21673 2026-01-06 2026-01-12 7.8 - -
CVE-2026-21674 2026-01-06 2026-01-12 3.3 - -
CVE-2026-21675 2026-01-06 2026-01-12 9.8 - -
CVE-2026-21485 2026-01-06 2026-01-14 8.8 - -
CVE-2026-21486 2026-01-06 2026-01-12 7.8 - -
CVE-2026-21487 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21676 2026-01-06 2026-01-12 8.8 - -
CVE-2026-21677 2026-01-06 2026-01-12 8.8 - -
CVE-2026-21488 2026-01-06 2026-01-14 6.1 - -
CVE-2026-21489 2026-01-06 2026-01-14 6.1 - -
CVE-2026-21493 2026-01-06 2026-01-14 6.6 - -
CVE-2026-21490 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21491 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21494 2026-01-06 2026-01-12 6.1 - -
CVE-2026-21492 2026-01-06 2026-01-12 5.5 - -
CVE-2026-21495 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21496 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21497 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21498 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21499 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21500 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21501 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21502 2026-01-07 2026-01-09 5.5 - -
CVE-2026-21503 2026-01-07 2026-01-09 6.1 - -
CVE-2026-21504 2026-01-07 2026-01-09 6.6 - -
CVE-2026-21505 2026-01-07 2026-01-12 5.5 - -
CVE-2026-21506 2026-01-07 2026-01-13 5.5 - -
CVE-2026-21678 2026-01-07 2026-01-13 7.8 - -
CVE-2026-21679 2026-01-07 2026-01-09 8.8 - -
CVE-2026-21680 2026-01-07 2026-01-09 6.5 - -
CVE-2026-21681 2026-01-07 2026-01-14 7.1 - -
CVE-2026-21682 2026-01-07 2026-01-14 8.8 - -
CVE-2026-21683 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21684 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21685 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21686 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21687 2026-01-07 2026-01-12 7.1 - -
CVE-2026-21688 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21689 2026-01-07 2026-01-12 6.5 - -
CVE-2026-21690 2026-01-07 2026-01-12 6.3 - -
CVE-2026-21691 2026-01-07 2026-01-12 5.4 - -
CVE-2026-21692 2026-01-07 2026-01-12 8.8 - -
CVE-2026-21693 2026-01-07 2026-01-12 8.8 - -
CVE-2026-22046 2026-01-07 2026-01-14 8.8 - -
CVE-2026-22047 2026-01-07 2026-01-14 8.8 - -
CVE-2026-22255 2026-01-08 2026-01-14 8.8 - -
CVE-2026-22861 2026-01-13 2026-01-16 8.8 - -
CVE-2026-24403 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24404 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24405 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24406 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24407 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24409 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24410 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24411 2026-01-24 2026-01-30 7.1 - -
CVE-2026-24412 2026-01-24 2026-01-30 8.8 - -
CVE-2026-24852 2026-01-28 2026-02-03 6.1 - -
CVE-2026-24856 2026-01-28 2026-02-03 7.8 - -
CVE-2026-25502 2026-02-03 2026-02-10 7.8 - -
CVE-2026-25503 2026-02-03 2026-02-10 7.1 - -
CVE-2026-25582 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25583 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25584 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25585 2026-02-04 2026-02-18 7.8 - -
CVE-2026-25634 2026-02-06 2026-02-19 7.8 - -
CVE-2026-27691 2026-02-25 2026-02-26 6.2 - -
CVE-2026-27692 2026-02-25 2026-02-26 7.1 - -
CVE-2026-30978 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30979 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30980 2026-03-10 2026-03-13 5.5 - -
CVE-2026-30981 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30982 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30983 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30984 2026-03-10 2026-03-13 6.1 - -
CVE-2026-30985 2026-03-10 2026-03-13 7.8 - -
CVE-2026-30986 2026-03-10 2026-03-13 5.5 - -
CVE-2026-30987 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31792 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31793 2026-03-10 2026-03-13 5.5 - -
CVE-2026-31794 2026-03-10 2026-03-13 5.5 - -
CVE-2026-31795 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31796 2026-03-10 2026-03-13 7.8 - -
CVE-2026-31797 2026-03-10 2026-03-13 6.1 - -
CVE-2026-34533 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34534 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34535 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34536 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34537 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34539 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34540 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34541 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34542 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34546 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34547 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34548 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34549 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34550 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34551 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34552 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34553 2026-03-31 2026-04-20 4.0 - -
CVE-2026-34554 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34555 2026-03-31 2026-04-20 6.2 - -
CVE-2026-34556 2026-03-31 2026-04-20 6.2 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for color by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with color's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.