Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

icewarp

About This Vendor

icewarp is a technology vendor producing software and infrastructure products. As a software provider, icewarp's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of icewarp's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 69 known vulnerabilities from icewarp. This includes 2 critical-severity issues and 13 high-severity issues that represent significant risk. These vulnerabilities affect 12 distinct products across icewarp's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2002 through 2025, indicating decades of continuous security attention and research. Organizations deploying icewarp products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-0258 2002-05-29 2025-04-03 - 7.5 Likely
CVE-2002-1899 2002-12-31 2025-04-03 - 4.3 Likely
CVE-2004-1669 2004-09-10 2025-04-03 - 4.3 Likely
CVE-2004-1670 2004-09-10 2025-04-03 - 7.5 Likely
CVE-2004-1671 2004-10-12 2025-04-03 - 5.0 Likely
CVE-2004-1672 2004-10-12 2025-04-03 - 7.5 Likely
CVE-2004-1673 2004-10-12 2025-04-03 - 7.5 Likely
CVE-2004-1674 2004-10-12 2025-04-03 - 7.5 Likely
CVE-2005-0320 2005-01-28 2025-04-03 - 5.0 Likely
CVE-2005-0321 2005-05-02 2025-04-03 - 2.1 Unknown
CVE-2005-0322 2005-05-02 2025-04-03 - 7.2 Unknown
CVE-2005-1488 2005-05-11 2025-04-03 - 1.9 Unknown
CVE-2005-1489 2005-05-11 2025-04-03 - 5.0 Likely
CVE-2005-1490 2005-05-11 2025-04-03 - 2.1 Unknown
CVE-2005-1491 2005-05-11 2025-04-03 - 4.6 Unknown
CVE-2005-3131 2005-10-04 2025-04-03 - 4.3 Likely
CVE-2005-3132 2005-10-04 2025-04-03 - 5.0 Likely
CVE-2005-3133 2005-10-04 2025-04-03 - 5.0 Likely
CVE-2005-4556 2005-12-28 2025-04-03 - 7.5 Likely
CVE-2005-4557 2005-12-28 2025-04-03 - 5.0 Likely
CVE-2005-4558 2005-12-28 2025-04-03 - 6.5 Likely
CVE-2005-4559 2005-12-28 2025-04-03 - 5.0 Likely
CVE-2006-2484 2006-05-19 2025-04-03 - 4.3 Likely
CVE-2006-0817 2006-07-21 2025-04-03 - 5.0 Likely
CVE-2006-0818 2006-07-21 2025-04-03 - 4.0 Likely
CVE-2007-5046 2007-09-24 2025-04-09 - 4.3 Likely
CVE-2008-5734 2008-12-26 2025-04-09 - 4.3 Likely
CVE-2009-1516 2009-05-04 2025-04-09 - 7.5 Likely
CVE-2009-1467 2009-05-05 2025-04-09 - 4.3 Likely
CVE-2009-1468 2009-05-05 2025-04-09 - 6.5 Likely
CVE-2009-1469 2009-05-05 2025-04-09 - 4.3 Likely
CVE-2011-3579 2011-09-30 2025-04-11 - 6.4 Likely
CVE-2011-3580 2011-09-30 2025-04-11 - 5.0 Likely
CVE-2017-12844 2017-08-23 2025-04-20 4.8 3.5 Unknown
CVE-2017-7855 2017-08-31 2025-04-20 6.1 4.3 Likely
CVE-2015-1503 2018-05-08 2024-11-21 7.5 7.8 Likely
CVE-2018-7475 2018-06-30 2024-11-21 6.1 4.3 Likely
CVE-2018-16324 2018-09-01 2024-11-21 6.1 4.3 Likely
CVE-2019-12593 2019-06-03 2024-11-21 7.5 5.0 Likely
CVE-2010-5334 2019-10-11 2024-11-21 7.5 7.8 Likely
CVE-2010-5335 2019-10-11 2024-11-21 7.5 7.8 Likely
CVE-2010-5336 2019-10-11 2024-11-21 6.1 4.3 Likely
CVE-2010-5337 2019-10-11 2024-11-21 6.1 4.3 Likely
CVE-2010-5338 2019-10-11 2024-11-21 6.1 4.3 Likely
CVE-2010-5339 2019-10-11 2024-11-21 6.1 4.3 Likely
CVE-2010-5340 2019-10-11 2024-11-21 6.1 4.3 Likely
CVE-2019-19266 2020-01-06 2024-11-21 5.4 3.5 Unknown
CVE-2019-19265 2020-01-06 2024-11-21 6.1 4.3 Likely
CVE-2020-8512 2020-02-01 2024-11-21 6.1 4.3 Likely
CVE-2020-14064 2020-07-15 2024-11-21 6.5 4.0 Likely
CVE-2020-14065 2020-07-15 2024-11-21 6.5 4.0 Likely
CVE-2020-14066 2020-07-15 2024-11-21 8.8 6.5 Likely
CVE-2020-27982 2020-11-02 2024-11-21 6.1 4.3 Likely
CVE-2020-25925 2021-07-07 2024-11-21 6.1 4.3 Likely
CVE-2022-35115 2022-08-23 2024-11-21 9.8 - -
CVE-2023-37728 2023-07-20 2024-11-21 6.1 - -
CVE-2021-36580 2023-07-27 2024-11-21 6.1 - -
CVE-2023-39699 2023-08-25 2024-11-21 9.8 - -
CVE-2023-39700 2023-08-25 2024-11-21 6.1 - -
CVE-2023-39600 2023-08-25 2024-11-21 6.1 - -
CVE-2023-39598 2023-09-05 2024-11-21 6.1 - -
CVE-2023-41013 2023-09-12 2024-11-21 6.1 - -
CVE-2023-40779 2023-09-14 2024-11-21 6.1 - -
CVE-2023-43319 2023-09-25 2024-11-21 6.1 - -
CVE-2024-0246 2024-01-05 2024-11-21 4.3 5.0 Likely
CVE-2024-55218 2025-01-07 2025-10-02 6.1 - -
CVE-2025-40630 2025-05-16 2025-10-09 6.1 - -
CVE-2025-40631 2025-05-16 2025-10-09 6.1 - -
CVE-2025-40632 2025-05-16 2025-10-09 6.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for icewarp by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with icewarp's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.