Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ge

About This Vendor

ge is a technology vendor producing software and infrastructure products. As a software provider, ge's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ge's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 128 known vulnerabilities from ge. This includes 33 critical-severity issues and 55 high-severity issues that represent significant risk. These vulnerabilities affect 245 distinct products across ge's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2023, indicating decades of continuous security attention and research. Organizations deploying ge products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-0174 2008-01-29 2026-04-23 9.8 5.0 Likely
CVE-2011-1918 2011-11-02 2025-04-11 - 10.0 Likely
CVE-2011-1919 2011-11-02 2025-04-11 - 10.0 Likely
CVE-2011-3320 2011-11-02 2025-04-11 - 4.3 Likely
CVE-2012-0229 2012-03-15 2025-04-11 - 10.0 Likely
CVE-2012-0230 2012-03-15 2025-04-11 - 10.0 Likely
CVE-2012-0231 2012-03-15 2025-04-11 - 10.0 Likely
CVE-2012-0232 2012-03-15 2025-04-11 - 6.4 Likely
CVE-2012-2515 2012-07-05 2025-04-11 - 9.3 Likely
CVE-2012-2516 2012-07-05 2025-04-11 - 9.3 Likely
CVE-2012-3010 2012-11-01 2025-04-11 - 10.0 Likely
CVE-2012-3021 2012-11-01 2025-04-11 - 10.0 Likely
CVE-2012-3026 2012-11-01 2025-04-11 - 10.0 Likely
CVE-2012-4689 2013-01-17 2025-04-11 - 4.3 Likely
CVE-2013-0651 2013-01-27 2025-04-11 - 5.0 Likely
CVE-2013-0652 2013-01-27 2025-04-11 - 5.0 Likely
CVE-2013-0653 2013-01-27 2025-04-11 - 4.3 Likely
CVE-2013-0654 2013-01-27 2025-04-11 - 9.3 Likely
CVE-2013-2785 2013-07-31 2025-04-11 - 9.3 Likely
CVE-2013-2811 2013-11-22 2025-04-11 - 7.1 Likely
CVE-2013-2823 2013-11-22 2025-04-11 - 4.7 Unknown
CVE-2014-0750 2014-01-25 2025-08-22 - 7.5 Likely
CVE-2014-0751 2014-01-25 2025-08-22 - 6.8 Likely
CVE-2014-2355 2015-01-17 2025-10-03 - 6.6 Unknown
CVE-2014-5418 2015-01-17 2025-11-05 - 5.0 Likely
CVE-2014-5419 2015-01-17 2025-11-05 - 10.0 Likely
CVE-2014-9203 2015-02-07 2025-04-12 - 5.0 Likely
CVE-2014-5409 2015-03-14 2025-11-03 - 6.4 Likely
CVE-2015-6456 2015-09-18 2025-04-12 - 9.0 Likely
CVE-2015-6459 2015-09-18 2025-04-12 - 10.0 Likely
CVE-2016-0861 2016-02-05 2025-04-12 8.8 9.0 Likely
CVE-2016-0862 2016-02-05 2025-04-12 6.5 4.0 Likely
CVE-2016-2310 2016-06-09 2025-04-12 9.8 10.0 Likely
CVE-2016-5787 2016-07-15 2025-04-12 6.3 4.6 Unknown
CVE-2016-5788 2016-11-25 2025-04-12 10.0 10.0 Likely
CVE-2016-9360 2017-02-13 2025-04-20 6.7 4.4 Unknown
CVE-2017-7905 2017-06-30 2025-04-20 9.8 5.0 Likely
CVE-2015-3976 2017-08-28 2025-11-05 5.4 6.8 Likely
CVE-2017-12732 2017-10-05 2025-04-20 6.8 4.9 Unknown
CVE-2018-5473 2018-02-19 2024-11-21 9.8 10.0 Likely
CVE-2018-5475 2018-02-19 2024-11-21 9.8 7.5 Likely
CVE-2017-14002 2018-03-20 2024-11-21 9.8 10.0 Likely
CVE-2017-14004 2018-03-20 2024-11-21 9.8 7.5 Likely
CVE-2017-14006 2018-03-20 2024-11-21 9.8 7.5 Likely
CVE-2017-14008 2018-03-20 2024-11-21 9.8 7.5 Likely
CVE-2018-8867 2018-05-18 2024-11-21 7.5 7.8 Likely
CVE-2018-10611 2018-06-04 2024-11-21 9.8 7.5 Likely
CVE-2018-10613 2018-06-04 2024-11-21 7.5 5.0 Likely
CVE-2018-10615 2018-06-04 2024-11-21 8.1 6.5 Likely
CVE-2017-7908 2018-10-02 2024-11-21 7.6 6.8 Likely
CVE-2018-17925 2018-10-10 2024-11-21 4.8 4.4 Unknown
CVE-2018-15362 2018-12-07 2024-11-21 9.1 6.4 Likely
CVE-2018-19003 2018-12-14 2024-11-21 7.5 5.0 Likely
CVE-2019-6544 2019-05-09 2024-11-21 5.6 6.8 Likely
CVE-2019-6546 2019-05-09 2024-11-21 7.8 6.8 Likely
CVE-2019-6548 2019-05-09 2024-11-21 9.8 6.8 Likely
CVE-2019-6564 2019-05-09 2024-11-21 7.8 6.9 Unknown
CVE-2019-6566 2019-05-09 2024-11-21 7.8 7.2 Unknown
CVE-2019-10966 2019-07-10 2024-11-21 5.3 5.0 Likely
CVE-2019-18267 2019-12-18 2024-11-21 5.4 3.5 Unknown
CVE-2012-6663 2020-01-23 2024-11-21 7.5 5.0 Likely
CVE-2020-6977 2020-02-20 2024-11-21 6.8 7.2 Unknown
CVE-2019-13554 2020-04-07 2024-11-21 8.8 6.5 Likely
CVE-2019-13559 2020-04-07 2024-11-21 7.8 7.2 Unknown
CVE-2020-6992 2020-04-15 2024-11-21 6.7 4.6 Unknown
CVE-2020-12017 2020-06-02 2024-11-21 9.8 9.0 Likely
CVE-2020-16240 2020-09-23 2024-11-21 5.3 5.0 Likely
CVE-2020-16244 2020-09-23 2024-11-21 7.2 4.0 Likely
CVE-2020-16242 2020-09-25 2024-11-21 6.1 4.3 Likely
CVE-2020-16246 2020-10-20 2024-11-21 6.1 4.3 Likely
CVE-2020-27263 2021-01-14 2024-11-21 9.1 6.4 Likely
CVE-2020-27265 2021-01-14 2024-11-21 9.8 7.5 Likely
CVE-2020-27267 2021-01-14 2024-11-21 9.1 6.4 Likely
CVE-2019-18255 2021-02-18 2024-11-21 5.5 2.1 Unknown
CVE-2019-18243 2021-02-18 2024-11-21 5.5 2.1 Unknown
CVE-2021-27438 2021-03-25 2024-11-21 8.8 6.5 Likely
CVE-2021-27440 2021-03-25 2024-11-21 9.8 7.5 Likely
CVE-2021-27448 2021-03-25 2024-11-21 7.8 4.6 Unknown
CVE-2021-27450 2021-03-25 2024-11-21 7.8 4.6 Unknown
CVE-2021-27452 2021-03-25 2024-11-21 7.8 7.2 Unknown
CVE-2021-27454 2021-03-25 2024-11-21 7.8 4.6 Unknown
CVE-2021-31477 2021-06-16 2024-11-21 7.3 7.5 Likely
CVE-2022-21798 2022-02-25 2024-11-21 7.5 7.5 Likely
CVE-2022-23921 2022-02-25 2024-11-21 7.5 3.7 Unknown
CVE-2020-25193 2022-03-18 2024-11-21 5.3 5.0 Likely
CVE-2020-25197 2022-03-18 2024-11-21 9.8 9.0 Likely
CVE-2021-27418 2022-03-23 2024-11-21 5.3 4.3 Likely
CVE-2021-27420 2022-03-23 2024-11-21 5.3 5.0 Likely
CVE-2021-27422 2022-03-23 2024-11-21 7.5 5.0 Likely
CVE-2021-27424 2022-03-23 2024-11-21 5.3 5.0 Likely
CVE-2021-27426 2022-03-23 2024-11-21 9.8 7.5 Likely
CVE-2021-27428 2022-03-23 2024-11-21 9.8 7.5 Likely
CVE-2021-27430 2022-03-23 2024-11-21 8.4 4.6 Unknown
CVE-2021-44477 2022-03-25 2024-11-21 7.5 5.0 Likely
CVE-2020-36547 2022-06-17 2024-11-21 5.9 7.2 Unknown
CVE-2020-36548 2022-06-17 2024-11-21 5.9 7.2 Unknown
CVE-2020-36549 2022-06-17 2024-11-21 8.8 7.2 Unknown
CVE-2022-37952 2022-08-25 2024-11-21 4.7 - -
CVE-2022-37953 2022-08-25 2024-11-21 4.7 - -
CVE-2022-2002 2022-12-07 2024-11-21 7.8 - -
CVE-2022-2948 2022-12-07 2024-11-21 7.8 - -
CVE-2022-2952 2022-12-07 2024-11-21 7.8 - -
CVE-2022-3084 2022-12-08 2024-11-21 7.8 - -
CVE-2022-3092 2022-12-08 2024-11-21 7.8 - -
CVE-2022-24116 2022-12-26 2025-04-12 9.8 - -
CVE-2022-24117 2022-12-26 2025-04-12 9.8 - -
CVE-2022-24118 2022-12-26 2025-04-12 9.1 - -
CVE-2022-24119 2022-12-26 2025-04-12 9.8 - -
CVE-2022-24120 2022-12-26 2025-04-12 4.6 - -
CVE-2022-43975 2023-01-17 2025-04-07 7.5 - -
CVE-2022-43976 2023-01-17 2025-04-07 9.8 - -
CVE-2022-43977 2023-01-17 2025-04-04 9.8 - -
CVE-2022-38469 2023-01-18 2024-11-21 7.5 - -
CVE-2022-43494 2023-01-18 2024-11-21 7.5 - -
CVE-2022-46331 2023-01-18 2024-11-21 7.5 - -
CVE-2022-46660 2023-01-18 2024-11-21 7.5 - -
CVE-2022-46732 2023-01-18 2025-01-17 9.8 - -
CVE-2023-0754 2023-02-23 2024-11-21 9.8 - -
CVE-2023-0755 2023-02-23 2024-11-21 9.8 - -
CVE-2023-0598 2023-03-16 2024-11-21 7.8 - -
CVE-2022-2825 2023-03-29 2025-02-18 9.8 - -
CVE-2022-2848 2023-03-29 2025-02-18 9.1 - -
CVE-2023-1552 2023-04-11 2024-11-21 6.4 - -
CVE-2023-3463 2023-07-19 2024-11-21 6.6 - -
CVE-2023-4487 2023-09-05 2024-11-21 7.8 - -
CVE-2023-0898 2023-11-07 2024-11-21 5.3 - -
CVE-2023-5908 2023-11-30 2024-11-21 9.1 - -
CVE-2023-5909 2023-11-30 2024-11-21 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ge by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ge's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.