Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

linecorp

About This Vendor

linecorp is a technology vendor producing software and infrastructure products. As a software provider, linecorp's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of linecorp's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 92 known vulnerabilities from linecorp. This includes 2 critical-severity issues and 38 high-severity issues that represent significant risk. These vulnerabilities affect 327 distinct products across linecorp's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2025, indicating decades of continuous security attention and research. Organizations deploying linecorp products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-7144 2014-08-16 2025-04-12 - 4.3 Likely
CVE-2016-1156 2016-02-19 2025-04-12 5.7 3.5 Unknown
CVE-2016-4831 2016-07-12 2025-04-12 7.8 7.2 Unknown
CVE-2016-4850 2017-04-20 2025-04-20 8.1 6.8 Likely
CVE-2018-0518 2018-02-23 2024-11-21 5.9 4.3 Likely
CVE-2018-0609 2018-06-26 2024-11-21 7.8 6.8 Likely
CVE-2018-13434 2018-08-16 2024-11-21 6.3 4.4 Unknown
CVE-2018-13435 2018-08-16 2024-11-21 7.0 4.4 Unknown
CVE-2018-13446 2018-08-16 2024-11-21 7.0 4.4 Unknown
CVE-2018-0650 2018-09-07 2024-11-21 7.4 5.8 Likely
CVE-2019-6007 2019-09-12 2024-11-21 8.8 6.8 Likely
CVE-2019-6010 2019-09-19 2024-11-21 7.8 6.8 Likely
CVE-2019-16771 2019-12-06 2024-11-21 4.8 5.0 Likely
CVE-2021-36214 2021-07-13 2024-11-21 6.1 4.3 Likely
CVE-2021-36215 2021-09-08 2024-11-21 5.3 5.0 Likely
CVE-2021-36216 2021-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2021-38388 2021-09-08 2025-05-12 8.8 6.5 Likely
CVE-2021-41011 2021-09-22 2024-11-21 7.5 4.3 Likely
CVE-2021-43795 2021-12-02 2024-11-21 7.5 5.0 Likely
CVE-2022-22820 2022-01-20 2024-11-21 5.5 4.3 Likely
CVE-2022-29505 2022-04-27 2024-11-21 7.8 4.4 Unknown
CVE-2022-41568 2022-11-29 2025-04-25 7.5 - -
CVE-2023-38493 2023-07-25 2024-11-21 7.5 - -
CVE-2023-43297 2023-10-02 2024-11-21 5.4 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2023-5554 2023-10-12 2024-11-21 4.8 - -
CVE-2023-39732 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39733 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39734 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39735 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39736 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39737 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39739 2023-10-25 2024-11-21 8.2 - -
CVE-2023-39740 2023-10-25 2024-11-21 8.2 - -
CVE-2023-38845 2023-10-25 2024-11-21 7.5 - -
CVE-2023-38846 2023-10-25 2024-11-21 7.5 - -
CVE-2023-38847 2023-10-25 2024-11-21 7.5 - -
CVE-2023-38848 2023-10-25 2024-11-21 7.5 - -
CVE-2023-38849 2023-10-25 2024-11-21 7.5 - -
CVE-2023-47363 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47364 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47365 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47366 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47367 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47369 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47368 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47370 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47372 2023-11-09 2024-11-21 6.5 - -
CVE-2023-47373 2023-11-09 2024-11-21 6.5 - -
CVE-2023-48134 2023-11-16 2024-11-21 7.5 - -
CVE-2023-43298 2023-12-07 2024-11-21 5.3 - -
CVE-2023-43299 2023-12-07 2024-11-21 5.3 - -
CVE-2023-43300 2023-12-07 2024-11-21 8.2 - -
CVE-2023-43301 2023-12-07 2024-11-21 8.2 - -
CVE-2023-43302 2023-12-07 2024-11-21 8.2 - -
CVE-2023-43303 2023-12-07 2024-11-21 8.2 - -
CVE-2023-43304 2023-12-07 2025-05-28 8.2 - -
CVE-2023-43305 2023-12-08 2024-11-21 8.2 - -
CVE-2023-45561 2024-01-02 2025-06-13 5.3 - -
CVE-2023-45559 2024-01-03 2025-06-03 8.2 - -
CVE-2023-43988 2024-01-24 2025-06-11 5.4 - -
CVE-2023-43989 2024-01-24 2025-06-16 5.4 - -
CVE-2023-43990 2024-01-24 2025-05-30 5.4 - -
CVE-2023-43991 2024-01-24 2025-05-30 5.4 - -
CVE-2023-43992 2024-01-24 2025-06-20 5.4 - -
CVE-2023-43993 2024-01-24 2024-11-21 5.4 - -
CVE-2023-43994 2024-01-24 2025-06-16 5.4 - -
CVE-2023-43995 2024-01-24 2025-06-20 5.4 - -
CVE-2023-43996 2024-01-24 2025-06-20 5.4 - -
CVE-2023-43997 2024-01-24 2025-06-20 5.4 - -
CVE-2023-43998 2024-01-24 2024-11-21 5.4 - -
CVE-2023-43999 2024-01-24 2025-06-11 5.4 - -
CVE-2023-44000 2024-01-24 2025-06-11 5.4 - -
CVE-2023-44001 2024-01-24 2025-05-30 5.4 - -
CVE-2023-48126 2024-01-26 2025-05-29 5.4 - -
CVE-2023-48127 2024-01-26 2025-06-11 5.4 - -
CVE-2023-48128 2024-01-26 2025-05-29 5.4 - -
CVE-2023-48130 2024-01-26 2024-11-21 5.4 - -
CVE-2023-48131 2024-01-26 2025-06-17 5.4 - -
CVE-2023-48132 2024-01-26 2025-06-20 5.4 - -
CVE-2023-48133 2024-01-26 2025-06-16 5.4 - -
CVE-2023-48135 2024-01-26 2025-06-17 5.4 - -
CVE-2023-48129 2024-01-26 2025-06-20 5.4 - -
CVE-2024-1143 2024-02-02 2025-06-03 9.3 - -
CVE-2024-1735 2024-02-26 2025-04-25 9.1 - -
CVE-2024-5739 2024-06-12 2025-12-19 6.1 - -
CVE-2025-11222 2025-12-04 2025-12-19 6.1 - -
CVE-2025-14019 2025-12-15 2025-12-19 3.4 - -
CVE-2025-14020 2025-12-15 2025-12-18 5.4 - -
CVE-2025-14021 2025-12-15 2025-12-18 4.3 - -
CVE-2025-14022 2025-12-15 2026-01-07 7.7 - -
CVE-2025-14023 2025-12-15 2026-01-07 3.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for linecorp by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with linecorp's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.