Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ethereal_group

About This Vendor

ethereal_group is a technology vendor producing software and infrastructure products. As a software provider, ethereal_group's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ethereal_group's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 105 known vulnerabilities from ethereal_group. This includes 33 high-severity issues requiring prompt remediation. These vulnerabilities affect 12 distinct products across ethereal_group's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2010, indicating decades of continuous security attention and research. Organizations deploying ethereal_group products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0333 1999-05-31 2025-04-03 - 5.0 Likely
CVE-1999-1227 1999-07-30 2025-04-03 - 7.2 Unknown
CVE-2000-1174 2001-01-09 2025-04-03 - 7.5 Likely
CVE-2002-0402 2002-06-18 2025-04-03 - 7.5 Likely
CVE-2002-0403 2002-06-18 2025-04-03 - 5.0 Likely
CVE-2002-0404 2002-06-18 2025-04-03 - 5.0 Likely
CVE-2002-0353 2002-06-25 2025-04-03 - 5.0 Likely
CVE-2002-0821 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0822 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0834 2002-09-24 2025-04-03 - 7.5 Likely
CVE-2002-1355 2002-12-23 2025-04-03 - 5.0 Likely
CVE-2002-1356 2002-12-23 2025-04-03 - 7.5 Likely
CVE-2003-0081 2003-03-18 2025-04-03 - 7.5 Likely
CVE-2003-0159 2003-04-02 2025-04-03 - 7.5 Likely
CVE-2003-0357 2003-06-09 2025-04-03 - 7.5 Likely
CVE-2003-0428 2003-07-24 2025-04-03 - 5.0 Likely
CVE-2003-0429 2003-07-24 2025-04-03 - 7.5 Likely
CVE-2003-0430 2003-07-24 2025-04-03 - 5.0 Likely
CVE-2003-0431 2003-07-24 2025-04-03 - 10.0 Likely
CVE-2003-0432 2003-07-24 2025-04-03 - 10.0 Likely
CVE-2003-0925 2003-12-01 2025-04-03 - 7.5 Likely
CVE-2003-0926 2003-12-01 2025-04-03 - 5.0 Likely
CVE-2003-0927 2003-12-01 2025-04-03 - 7.5 Likely
CVE-2003-1012 2004-01-05 2025-04-03 - 5.0 Likely
CVE-2004-0176 2004-05-04 2025-04-03 - 5.0 Likely
CVE-2004-0367 2004-05-04 2025-04-03 - 5.0 Likely
CVE-2004-0504 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0505 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0506 2004-08-18 2025-04-03 - 5.0 Likely
CVE-2004-0507 2004-08-18 2025-04-03 - 10.0 Likely
CVE-2004-0633 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-0634 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-0635 2004-12-06 2025-04-03 - 5.0 Likely
CVE-2004-1139 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1142 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1145 2004-12-15 2025-04-03 - 5.0 Likely
CVE-2004-1140 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1141 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1761 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2005-0699 2005-03-08 2025-04-03 - 7.5 Likely
CVE-2005-0765 2005-03-12 2025-04-03 - 5.0 Likely
CVE-2005-1281 2005-04-26 2025-04-03 - 5.0 Likely
CVE-2005-0006 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0007 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0008 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0009 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0010 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0084 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0704 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0705 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0739 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0766 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-1456 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1457 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1458 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1459 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1460 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1461 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1462 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1463 2005-05-05 2025-04-03 - 7.5 Likely
CVE-2005-1464 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1465 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1466 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1467 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1468 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1469 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-1470 2005-05-05 2025-04-03 - 5.0 Likely
CVE-2005-2360 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2361 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2362 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2363 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2364 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2365 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2366 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-2367 2005-08-10 2025-04-03 - 7.5 Likely
CVE-2005-3184 2005-10-20 2025-04-03 - 10.0 Likely
CVE-2005-3241 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3242 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3243 2005-10-27 2025-04-03 - 7.5 Likely
CVE-2005-3244 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3245 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3246 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3247 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3248 2005-10-27 2025-04-03 - 5.0 Likely
CVE-2005-3249 2005-10-27 2025-04-03 - 6.4 Likely
CVE-2005-3313 2005-11-01 2025-04-03 - 5.0 Likely
CVE-2005-3651 2005-12-10 2025-04-03 - 7.5 Likely
CVE-2005-4585 2005-12-29 2025-04-03 - 7.8 Likely
CVE-2006-1932 2006-04-25 2025-04-03 - 10.0 Likely
CVE-2006-1933 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1934 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1935 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1936 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1937 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1938 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1939 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-1940 2006-04-25 2025-04-03 - 5.0 Likely
CVE-2006-3628 2006-07-21 2025-04-03 - 10.0 Likely
CVE-2006-3629 2006-07-21 2025-04-03 - 7.8 Likely
CVE-2006-3632 2006-07-21 2025-04-03 - 10.0 Likely
CVE-2007-6111 2007-11-23 2025-04-09 - 7.1 Likely
CVE-2007-6118 2007-11-23 2025-04-09 - 7.8 Likely
CVE-2007-6120 2007-11-23 2025-04-09 - 5.0 Likely
CVE-2007-6121 2007-11-23 2025-04-09 - 5.0 Likely
CVE-2010-1455 2010-05-12 2025-04-11 - 4.3 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ethereal_group by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ethereal_group's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.