Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ipswitch

About This Vendor

ipswitch is a technology vendor producing software and infrastructure products. As a software provider, ipswitch's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ipswitch's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 109 known vulnerabilities from ipswitch. This includes 8 critical-severity issues and 40 high-severity issues that represent significant risk. These vulnerabilities affect 26 distinct products across ipswitch's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2019, indicating decades of continuous security attention and research. Organizations deploying ipswitch products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1170 1999-01-02 2025-04-03 - 4.6 Unknown
CVE-1999-0362 1999-02-02 2025-04-03 - 5.0 Likely
CVE-1999-1171 1999-02-02 2025-04-03 - 4.6 Unknown
CVE-1999-1046 1999-03-01 2025-04-03 - 10.0 Likely
CVE-1999-1551 1999-03-02 2025-04-03 - 5.0 Likely
CVE-2000-0019 1999-03-04 2025-04-03 - 2.1 Unknown
CVE-1999-1078 1999-07-29 2025-04-03 - 7.5 Likely
CVE-1999-1497 1999-12-21 2025-04-03 - 7.2 Unknown
CVE-2000-0056 2000-01-05 2025-04-03 - 5.0 Likely
CVE-2000-0301 2000-04-06 2025-04-03 - 5.0 Likely
CVE-2000-0780 2000-10-20 2025-04-03 - 6.4 Likely
CVE-2000-0825 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2000-0839 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2001-0039 2001-02-16 2025-04-03 - 5.0 Likely
CVE-2001-0494 2001-06-27 2025-04-03 - 7.5 Likely
CVE-2001-1280 2001-10-12 2025-04-03 - 5.0 Likely
CVE-2001-1281 2001-10-12 2025-04-03 - 5.0 Likely
CVE-2001-1282 2001-10-12 2025-04-03 - 5.0 Likely
CVE-2001-1283 2001-10-12 2025-04-03 - 7.5 Likely
CVE-2001-1284 2001-10-12 2025-04-03 - 7.5 Likely
CVE-2001-1285 2001-10-12 2025-04-03 - 5.0 Likely
CVE-2001-1286 2001-10-12 2025-04-03 - 7.5 Likely
CVE-2001-1287 2001-10-12 2025-04-03 - 7.5 Likely
CVE-2001-1211 2001-12-31 2025-04-03 - 7.5 Likely
CVE-2002-0777 2002-08-12 2025-04-03 - 10.0 Likely
CVE-2002-1076 2002-10-04 2025-04-03 - 7.5 Likely
CVE-2002-1077 2002-10-04 2025-04-03 - 5.0 Likely
CVE-2002-1851 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2003-0772 2003-09-22 2025-04-03 - 7.5 Likely
CVE-2004-1884 2004-03-23 2025-04-03 - 7.5 Likely
CVE-2004-0799 2004-10-20 2025-04-03 - 5.0 Likely
CVE-2004-0297 2004-11-23 2025-04-03 - 10.0 Likely
CVE-2004-1520 2004-12-31 2025-04-03 - 4.6 Unknown
CVE-2004-1848 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-2401 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-2422 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-2423 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1135 2005-01-10 2025-04-03 - 5.0 Likely
CVE-1999-1557 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0707 2005-05-02 2025-04-03 - 7.2 Unknown
CVE-2005-1249 2005-05-25 2025-04-03 - 5.0 Likely
CVE-2005-1252 2005-05-25 2025-04-03 - 5.0 Likely
CVE-2005-1254 2005-05-25 2025-04-03 - 5.0 Likely
CVE-2005-1255 2005-05-25 2025-04-03 - 10.0 Likely
CVE-2005-1256 2005-05-25 2025-04-03 - 10.0 Likely
CVE-2005-1250 2005-06-22 2025-04-03 - 7.5 Likely
CVE-2005-2160 2005-07-06 2025-04-03 7.5 5.0 Likely
CVE-2005-2923 2005-12-07 2025-04-03 - 4.0 Likely
CVE-2005-2931 2005-12-07 2025-04-03 - 7.5 Likely
CVE-2005-1939 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-3526 2005-12-31 2025-04-03 - 6.5 Likely
CVE-2006-0911 2006-02-28 2025-04-03 - 5.0 Likely
CVE-2006-2351 2006-05-15 2025-04-03 - 4.3 Likely
CVE-2006-2352 2006-05-15 2025-04-03 - 4.3 Likely
CVE-2006-2353 2006-05-15 2025-04-03 - 5.0 Likely
CVE-2006-2354 2006-05-15 2025-04-03 - 5.0 Likely
CVE-2006-2355 2006-05-15 2025-04-03 - 5.0 Likely
CVE-2006-2356 2006-05-15 2025-04-03 - 5.0 Likely
CVE-2006-2357 2006-05-15 2025-04-03 - 5.0 Likely
CVE-2006-2531 2006-05-22 2025-04-03 - 7.5 Likely
CVE-2006-3552 2006-07-13 2025-04-03 - 6.4 Likely
CVE-2006-4379 2006-09-08 2025-04-03 - 7.5 Likely
CVE-2006-4847 2006-09-19 2025-04-03 - 6.5 Likely
CVE-2006-4974 2006-09-25 2025-04-03 - 7.5 Likely
CVE-2006-5000 2006-09-26 2025-04-09 - 6.5 Likely
CVE-2006-5001 2006-09-26 2025-04-09 - 5.0 Likely
CVE-2007-0330 2007-01-18 2025-04-09 - 7.5 Likely
CVE-2007-0665 2007-02-02 2025-04-09 - 6.8 Likely
CVE-2007-0666 2007-02-02 2025-04-09 - 6.8 Likely
CVE-2007-1637 2007-03-23 2025-04-09 - 9.3 Likely
CVE-2007-2213 2007-04-24 2025-04-09 - 7.8 Likely
CVE-2007-3823 2007-07-17 2025-04-09 - 7.8 Likely
CVE-2007-3925 2007-07-21 2025-04-09 - 6.5 Likely
CVE-2007-3926 2007-07-21 2025-04-09 - 7.8 Likely
CVE-2007-3927 2007-07-21 2025-04-09 - 10.0 Likely
CVE-2007-3959 2007-07-24 2025-04-09 - 5.0 Likely
CVE-2007-4555 2007-08-28 2025-04-09 - 4.3 Likely
CVE-2007-5094 2007-09-26 2025-04-09 - 7.5 Likely
CVE-2007-4345 2007-10-31 2025-04-09 - 7.5 Likely
CVE-2008-0608 2008-02-06 2025-04-09 - 5.0 Likely
CVE-2008-0944 2008-02-25 2025-04-09 - 5.0 Likely
CVE-2008-0945 2008-02-25 2025-04-09 - 3.5 Unknown
CVE-2008-0946 2008-02-25 2025-04-09 - 4.9 Unknown
CVE-2008-3734 2008-08-20 2025-04-09 - 9.3 Likely
CVE-2008-3795 2008-08-27 2025-04-09 - 10.0 Likely
CVE-2008-5692 2008-12-19 2025-04-09 - 5.0 Likely
CVE-2008-5693 2008-12-19 2025-04-09 - 5.0 Likely
CVE-2007-2795 2009-01-27 2025-04-09 - 9.0 Likely
CVE-2009-4775 2010-04-21 2025-04-11 - 4.3 Likely
CVE-2011-1430 2011-03-16 2025-04-11 - 6.8 Likely
CVE-2014-3878 2014-06-05 2025-04-12 - 4.3 Likely
CVE-2011-4722 2014-12-28 2025-04-12 - 7.8 Likely
CVE-2015-7675 2016-02-10 2025-04-12 6.5 4.0 Likely
CVE-2015-7677 2016-02-10 2025-04-12 4.3 4.0 Likely
CVE-2015-7678 2016-02-10 2025-04-12 8.8 6.8 Likely
CVE-2015-7679 2016-02-10 2025-04-12 6.1 4.3 Likely
CVE-2015-7680 2016-02-10 2025-04-12 5.3 5.0 Likely
CVE-2015-7676 2016-04-15 2025-04-12 5.4 3.5 Unknown
CVE-2017-6195 2017-05-18 2025-04-20 9.8 7.5 Likely
CVE-2017-12638 2017-10-03 2025-04-20 9.8 7.5 Likely
CVE-2017-12639 2017-10-03 2025-04-20 9.8 7.5 Likely
CVE-2017-16513 2017-11-03 2025-04-20 7.8 4.6 Unknown
CVE-2018-6545 2018-02-02 2024-11-21 6.1 4.3 Likely
CVE-2019-12144 2019-06-11 2024-11-21 9.8 7.5 Likely
CVE-2019-12145 2019-06-11 2024-11-21 7.5 5.0 Likely
CVE-2019-12146 2019-06-11 2024-11-21 9.1 6.4 Likely
CVE-2019-16383 2019-09-24 2024-11-21 9.4 7.5 Likely
CVE-2019-18464 2019-10-31 2024-11-21 9.8 7.5 Likely
CVE-2019-18465 2019-10-31 2024-11-21 9.8 6.8 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ipswitch by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ipswitch's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.