Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

invision_power_services

About This Vendor

invision_power_services is a technology vendor producing software and infrastructure products. As a software provider, invision_power_services's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of invision_power_services's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 73 known vulnerabilities from invision_power_services. This includes 29 high-severity issues requiring prompt remediation. These vulnerabilities affect 11 distinct products across invision_power_services's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2002 through 2010, reflecting sustained security scrutiny over multiple years. Organizations deploying invision_power_services products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-1149 2002-10-11 2025-04-03 - 5.0 Likely
CVE-2003-1385 2003-12-31 2025-04-03 - 6.8 Likely
CVE-2003-1454 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1785 2004-01-03 2025-04-03 - 7.5 Likely
CVE-2004-0338 2004-11-23 2025-04-03 - 10.0 Likely
CVE-2004-0355 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-0359 2004-11-23 2025-04-03 - 6.8 Likely
CVE-2004-1531 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-1578 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2004-1835 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-1836 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-2279 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2005-0477 2005-03-30 2025-04-03 - 4.3 Likely
CVE-2005-1070 2005-04-11 2025-04-03 - 7.5 Likely
CVE-2005-0217 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-0886 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1443 2005-05-03 2025-04-03 - 6.8 Likely
CVE-2005-1597 2005-05-16 2025-04-03 - 4.3 Likely
CVE-2005-1598 2005-05-16 2025-04-03 - 7.5 Likely
CVE-2005-1816 2005-06-01 2025-04-03 - 4.6 Unknown
CVE-2005-1817 2005-06-01 2025-04-03 - 5.0 Likely
CVE-2005-1945 2005-06-09 2025-04-03 - 4.3 Likely
CVE-2005-1946 2005-06-09 2025-04-03 - 7.5 Likely
CVE-2005-1948 2005-06-09 2025-04-03 - 7.5 Likely
CVE-2005-2542 2005-08-10 2025-04-03 - 5.0 Likely
CVE-2005-3395 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3477 2005-11-03 2025-04-03 - 4.3 Likely
CVE-2005-3547 2005-11-16 2025-04-03 - 4.3 Likely
CVE-2005-3548 2005-11-16 2025-04-03 - 4.0 Likely
CVE-2005-3549 2005-11-16 2025-04-03 - 6.5 Likely
CVE-2006-0888 2006-02-25 2025-04-03 - 2.6 Unknown
CVE-2006-0909 2006-02-28 2025-04-03 - 5.0 Likely
CVE-2006-0910 2006-02-28 2025-04-03 - 5.0 Likely
CVE-2006-1076 2006-03-09 2025-04-03 - 7.5 Likely
CVE-2006-1267 2006-03-19 2025-04-03 - 5.1 Unknown
CVE-2006-1287 2006-03-19 2025-04-03 - 5.8 Likely
CVE-2006-1288 2006-03-19 2025-04-03 - 7.5 Likely
CVE-2006-1326 2006-03-21 2025-04-03 - 4.3 Likely
CVE-2006-1369 2006-03-23 2025-04-03 - 6.8 Likely
CVE-2006-2059 2006-04-26 2025-04-03 - 5.0 Likely
CVE-2006-2060 2006-04-26 2025-04-03 - 6.4 Likely
CVE-2006-2061 2006-04-26 2025-04-03 - 5.0 Likely
CVE-2006-2097 2006-04-29 2025-04-03 - 7.5 Likely
CVE-2006-2202 2006-05-04 2025-04-03 - 6.4 Likely
CVE-2006-2204 2006-05-05 2025-04-03 - 5.5 Likely
CVE-2006-2217 2006-05-05 2025-04-03 - 7.5 Likely
CVE-2006-2251 2006-05-09 2025-04-03 - 6.4 Likely
CVE-2006-2498 2006-05-20 2025-04-03 - 6.4 Likely
CVE-2006-3197 2006-06-23 2025-04-03 - 4.3 Likely
CVE-2006-3543 2006-07-13 2025-04-03 - 7.5 Likely
CVE-2006-3544 2006-07-13 2025-04-03 - 7.5 Likely
CVE-2006-4155 2006-08-16 2025-04-03 - 7.5 Likely
CVE-2006-5203 2006-10-10 2025-04-09 - 5.1 Unknown
CVE-2006-5204 2006-10-10 2025-04-09 - 2.1 Unknown
CVE-2006-5205 2006-10-10 2025-04-09 - 5.0 Likely
CVE-2006-5206 2006-10-10 2025-04-09 - 7.5 Likely
CVE-2006-6369 2006-12-07 2025-04-09 - 7.5 Likely
CVE-2006-6370 2006-12-07 2025-04-09 - 7.5 Likely
CVE-2006-7064 2007-02-24 2025-04-09 - 9.3 Likely
CVE-2006-7071 2007-03-02 2025-04-09 - 7.5 Likely
CVE-2007-2349 2007-04-30 2025-04-09 - 5.8 Likely
CVE-2007-2963 2007-05-31 2025-04-09 - 4.3 Likely
CVE-2007-3219 2007-06-14 2025-04-09 - 7.8 Likely
CVE-2007-4912 2007-09-17 2025-04-09 - 4.3 Likely
CVE-2007-4913 2007-09-17 2025-04-09 - 7.5 Likely
CVE-2007-4914 2007-09-17 2025-04-09 - 6.0 Unknown
CVE-2007-5688 2007-10-29 2025-04-09 - 7.5 Likely
CVE-2008-0421 2008-01-23 2025-04-09 - 7.5 Likely
CVE-2008-0913 2008-02-22 2025-04-09 - 4.3 Likely
CVE-2008-1359 2008-03-17 2025-04-09 - 4.3 Likely
CVE-2008-4171 2008-09-22 2025-04-09 - 7.5 Likely
CVE-2008-6565 2009-03-31 2025-04-09 - 4.3 Likely
CVE-2010-0802 2010-03-02 2025-04-11 - 7.5 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for invision_power_services by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with invision_power_services's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.