Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

exiv2

About This Vendor

exiv2 is a technology vendor producing software and infrastructure products. As a software provider, exiv2's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of exiv2's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 124 known vulnerabilities from exiv2. This includes 2 critical-severity issues and 24 high-severity issues that represent significant risk. These vulnerabilities affect 9 distinct products across exiv2's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2007 through 2026, indicating decades of continuous security attention and research. Organizations deploying exiv2 products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-6353 2007-12-20 2025-04-09 - 7.5 Likely
CVE-2008-2696 2008-06-13 2025-04-09 - 4.3 Likely
CVE-2014-9449 2015-01-02 2025-04-12 - 5.0 Likely
CVE-2017-9239 2017-05-26 2025-04-20 6.5 4.3 Likely
CVE-2017-9953 2017-06-26 2025-04-20 7.5 5.0 Likely
CVE-2017-11336 2017-07-17 2025-04-20 6.5 4.3 Likely
CVE-2017-11337 2017-07-17 2025-04-20 6.5 4.3 Likely
CVE-2017-11338 2017-07-17 2025-04-20 6.5 4.3 Likely
CVE-2017-11339 2017-07-17 2025-04-20 6.5 4.3 Likely
CVE-2017-11340 2017-07-17 2025-04-20 6.5 4.3 Likely
CVE-2017-11553 2017-07-23 2025-04-20 7.5 5.0 Likely
CVE-2017-11591 2017-07-24 2025-04-20 7.5 5.0 Likely
CVE-2017-11592 2017-07-24 2025-04-20 7.5 5.0 Likely
CVE-2017-11683 2017-07-27 2025-04-20 6.5 4.3 Likely
CVE-2017-12955 2017-08-18 2025-04-20 8.8 6.8 Likely
CVE-2017-12956 2017-08-18 2025-04-20 6.5 4.3 Likely
CVE-2017-12957 2017-08-18 2025-04-20 6.5 4.3 Likely
CVE-2017-14857 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14858 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14859 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14860 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14861 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14862 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14863 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14864 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14865 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-14866 2017-09-29 2025-04-20 5.5 4.3 Likely
CVE-2017-1000126 2017-11-17 2025-04-20 5.5 4.3 Likely
CVE-2017-1000127 2017-11-17 2025-04-20 5.5 4.3 Likely
CVE-2017-1000128 2017-11-17 2025-04-20 5.5 4.3 Likely
CVE-2017-17669 2017-12-13 2025-04-20 5.5 4.3 Likely
CVE-2017-18005 2017-12-31 2025-04-20 5.5 4.3 Likely
CVE-2018-4868 2018-01-03 2024-11-21 5.5 4.3 Likely
CVE-2018-5772 2018-01-18 2024-11-21 5.5 4.3 Likely
CVE-2017-17722 2018-02-12 2024-11-21 6.5 4.3 Likely
CVE-2017-17723 2018-02-12 2024-11-21 8.1 5.8 Likely
CVE-2017-17724 2018-02-12 2024-11-21 6.5 4.3 Likely
CVE-2017-17725 2018-02-12 2024-11-21 6.5 4.3 Likely
CVE-2018-8976 2018-03-25 2024-11-21 6.5 4.3 Likely
CVE-2018-8977 2018-03-25 2024-11-21 6.5 4.3 Likely
CVE-2018-9144 2018-03-30 2024-11-21 8.1 5.8 Likely
CVE-2018-9145 2018-03-30 2024-11-21 6.5 4.3 Likely
CVE-2018-9303 2018-04-04 2024-11-21 6.5 4.3 Likely
CVE-2018-9304 2018-04-04 2024-11-21 6.5 4.3 Likely
CVE-2018-9305 2018-04-04 2024-11-21 8.1 5.8 Likely
CVE-2018-10772 2018-05-07 2024-11-21 6.5 4.3 Likely
CVE-2018-10780 2018-05-07 2024-11-21 6.5 4.3 Likely
CVE-2018-10958 2018-05-10 2024-11-21 6.5 4.3 Likely
CVE-2018-10998 2018-05-12 2024-11-21 6.5 4.3 Likely
CVE-2018-10999 2018-05-12 2024-11-21 6.5 4.3 Likely
CVE-2018-11037 2018-05-14 2024-11-21 6.5 4.3 Likely
CVE-2018-11531 2018-05-29 2024-11-21 9.8 7.5 Likely
CVE-2018-12264 2018-06-13 2024-11-21 8.8 6.8 Likely
CVE-2018-12265 2018-06-13 2024-11-21 8.8 6.8 Likely
CVE-2018-14046 2018-07-13 2024-11-21 8.8 6.8 Likely
CVE-2018-14338 2018-07-17 2024-11-21 8.1 6.8 Likely
CVE-2018-16336 2018-09-02 2024-11-21 6.5 4.3 Likely
CVE-2018-17229 2018-09-19 2024-11-21 6.5 4.3 Likely
CVE-2018-17230 2018-09-19 2024-11-21 6.5 4.3 Likely
CVE-2018-17282 2018-09-20 2024-11-21 6.5 4.3 Likely
CVE-2018-17581 2018-09-28 2024-11-21 6.5 4.3 Likely
CVE-2018-18915 2018-11-03 2024-11-21 6.5 4.3 Likely
CVE-2018-19107 2018-11-08 2024-11-21 6.5 4.3 Likely
CVE-2018-19108 2018-11-08 2024-11-21 6.5 4.3 Likely
CVE-2018-19535 2018-11-26 2024-11-21 6.5 4.3 Likely
CVE-2018-19607 2018-11-27 2024-11-21 6.5 4.3 Likely
CVE-2018-20096 2018-12-12 2024-11-21 6.5 4.3 Likely
CVE-2018-20097 2018-12-12 2024-11-21 6.5 4.3 Likely
CVE-2018-20098 2018-12-12 2024-11-21 6.5 4.3 Likely
CVE-2018-20099 2018-12-12 2024-11-21 6.5 4.3 Likely
CVE-2019-9143 2019-02-25 2024-11-21 8.8 6.8 Likely
CVE-2019-9144 2019-02-25 2024-11-21 8.8 6.8 Likely
CVE-2019-13108 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13109 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13110 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13111 2019-06-30 2024-11-21 5.5 4.3 Likely
CVE-2019-13112 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13113 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13114 2019-06-30 2024-11-21 6.5 4.3 Likely
CVE-2019-13504 2019-07-11 2024-11-21 6.5 4.3 Likely
CVE-2019-14368 2019-07-28 2024-11-21 7.8 6.8 Likely
CVE-2019-14369 2019-07-28 2024-11-21 6.5 4.3 Likely
CVE-2019-14370 2019-07-28 2024-11-21 6.5 4.3 Likely
CVE-2019-14982 2019-08-12 2024-11-21 6.5 4.3 Likely
CVE-2019-17402 2019-10-09 2024-11-21 6.5 4.3 Likely
CVE-2019-20421 2020-01-27 2024-11-21 7.5 7.8 Likely
CVE-2021-3482 2021-04-08 2024-11-21 6.5 6.4 Likely
CVE-2021-29457 2021-04-19 2024-11-21 7.8 6.8 Likely
CVE-2021-29458 2021-04-19 2024-11-21 5.5 4.3 Likely
CVE-2021-29470 2021-04-23 2024-11-21 4.7 4.3 Likely
CVE-2021-29473 2021-04-26 2024-11-21 2.5 2.6 Unknown
CVE-2021-29463 2021-04-30 2024-11-21 3.3 4.3 Likely
CVE-2021-29464 2021-04-30 2024-11-21 3.3 6.8 Likely
CVE-2021-29623 2021-05-13 2024-11-21 3.6 4.3 Likely
CVE-2021-32617 2021-05-17 2024-11-21 4.7 4.3 Likely
CVE-2020-19716 2021-07-13 2024-11-21 6.5 4.3 Likely
CVE-2021-31292 2021-07-26 2024-11-21 7.5 5.0 Likely
CVE-2021-32815 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-34334 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-37623 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-37616 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-37618 2021-08-09 2024-11-21 4.7 4.3 Likely
CVE-2021-37619 2021-08-09 2024-11-21 4.7 4.3 Likely
CVE-2021-37620 2021-08-09 2024-11-21 4.7 4.3 Likely
CVE-2021-37621 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-37622 2021-08-09 2024-11-21 5.5 4.3 Likely
CVE-2021-34335 2021-08-09 2024-11-21 4.7 4.3 Likely
CVE-2021-37615 2021-08-09 2024-11-21 4.7 4.3 Likely
CVE-2020-18898 2021-08-19 2024-11-21 6.5 4.3 Likely
CVE-2020-18899 2021-08-19 2024-11-21 6.5 4.3 Likely
CVE-2020-18771 2021-08-23 2024-11-21 8.1 5.8 Likely
CVE-2020-18773 2021-08-23 2024-11-21 6.5 4.3 Likely
CVE-2020-18774 2021-08-23 2024-11-21 6.5 4.3 Likely
CVE-2020-18831 2023-08-22 2024-11-21 7.8 - -
CVE-2023-44398 2023-11-06 2024-11-21 8.8 - -
CVE-2024-24826 2024-02-12 2024-11-21 5.5 - -
CVE-2024-25112 2024-02-12 2024-11-21 5.5 - -
CVE-2024-39695 2024-07-08 2024-11-21 5.3 - -
CVE-2025-26623 2025-02-18 2025-09-02 9.8 - -
CVE-2025-54080 2025-08-29 2025-09-02 5.5 - -
CVE-2025-55304 2025-08-29 2025-09-02 5.5 - -
CVE-2026-25884 2026-03-02 2026-03-05 8.1 - -
CVE-2026-27596 2026-03-02 2026-03-05 7.5 - -
CVE-2026-27631 2026-03-02 2026-03-05 5.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for exiv2 by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with exiv2's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.