Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mit

About This Vendor

mit is a technology vendor producing software and infrastructure products. As a software provider, mit's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mit's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 157 known vulnerabilities from mit. This includes 8 critical-severity issues and 74 high-severity issues that represent significant risk. These vulnerabilities affect 93 distinct products across mit's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1996 through 2024, indicating decades of continuous security attention and research. Organizations deploying mit products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0143 1996-02-21 2025-04-03 - 4.6 Unknown
CVE-1999-1296 1997-04-29 2025-04-03 - 7.2 Unknown
CVE-1999-1321 1998-11-05 2025-04-03 - 7.5 Likely
CVE-1999-0713 1999-06-11 2025-04-03 - 7.2 Unknown
CVE-2000-0389 2000-05-16 2025-04-03 - 10.0 Likely
CVE-2000-0390 2000-05-16 2025-04-03 - 10.0 Likely
CVE-2000-0391 2000-05-16 2025-04-03 - 10.0 Likely
CVE-2000-0392 2000-05-16 2025-04-03 - 7.2 Unknown
CVE-2000-0546 2000-06-09 2025-04-03 - 5.0 Likely
CVE-2000-0547 2000-06-09 2025-04-03 - 5.0 Likely
CVE-2000-0548 2000-06-09 2025-04-03 - 5.0 Likely
CVE-2000-0549 2000-06-09 2025-04-03 - 5.0 Likely
CVE-2000-0550 2000-06-09 2025-04-03 - 5.0 Likely
CVE-2000-0514 2000-06-14 2025-04-03 - 10.0 Likely
CVE-2001-1323 2001-05-16 2025-04-03 - 7.5 Likely
CVE-2001-0247 2001-06-18 2025-04-03 - 10.0 Likely
CVE-2001-0417 2001-06-27 2025-04-03 - 2.1 Unknown
CVE-2001-0554 2001-08-14 2025-04-03 - 10.0 Likely
CVE-2002-0900 2002-10-04 2025-04-03 - 7.5 Likely
CVE-2002-1235 2002-11-04 2025-04-03 - 10.0 Likely
CVE-2002-1652 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2002-0036 2003-02-19 2025-04-03 - 5.0 Likely
CVE-2003-0041 2003-02-19 2025-04-03 - 10.0 Likely
CVE-2003-0058 2003-02-19 2025-04-03 - 5.0 Likely
CVE-2003-0059 2003-02-19 2025-04-03 - 7.5 Likely
CVE-2003-0060 2003-02-19 2025-04-03 - 7.5 Likely
CVE-2003-0138 2003-03-24 2025-04-03 - 7.5 Likely
CVE-2003-0139 2003-03-24 2025-04-03 - 7.5 Likely
CVE-2003-0028 2003-03-25 2025-04-03 - 7.5 Likely
CVE-2003-0072 2003-04-02 2025-04-03 - 5.0 Likely
CVE-2003-0082 2003-04-02 2025-04-03 - 5.0 Likely
CVE-2002-1575 2004-03-03 2025-04-03 - 5.0 Likely
CVE-2004-0523 2004-08-18 2025-04-03 - 10.0 Likely
CVE-2004-0642 2004-09-28 2025-04-03 - 7.5 Likely
CVE-2004-0643 2004-09-28 2025-04-03 - 4.6 Unknown
CVE-2004-0644 2004-09-28 2025-04-03 - 5.0 Likely
CVE-2004-0772 2004-10-20 2025-04-03 9.8 7.5 Likely
CVE-2004-1189 2004-12-31 2025-04-03 - 7.2 Unknown
CVE-2004-0971 2005-02-09 2025-04-03 - 2.1 Unknown
CVE-2005-0488 2005-06-14 2025-04-03 - 5.0 Likely
CVE-2005-1174 2005-07-18 2025-04-03 - 5.0 Likely
CVE-2005-1175 2005-07-18 2025-04-03 - 7.5 Likely
CVE-2005-1689 2005-07-18 2025-04-03 9.8 7.5 Likely
CVE-2006-3083 2006-08-09 2025-04-03 - 7.2 Unknown
CVE-2006-3084 2006-08-09 2025-04-03 - 7.2 Unknown
CVE-2006-6143 2006-12-31 2025-04-09 - 9.3 Likely
CVE-2006-6144 2006-12-31 2025-04-09 - 5.0 Likely
CVE-2007-0956 2007-04-06 2025-04-09 - 10.0 Likely
CVE-2007-0957 2007-04-06 2025-04-09 - 9.0 Likely
CVE-2007-1216 2007-04-06 2025-04-09 - 9.0 Likely
CVE-2007-3149 2007-06-11 2025-04-09 - 7.2 Unknown
CVE-2007-2442 2007-06-26 2025-04-09 - 10.0 Likely
CVE-2007-2443 2007-06-26 2025-04-09 - 8.3 Unknown
CVE-2007-2798 2007-06-26 2025-04-09 - 9.0 Likely
CVE-2007-3999 2007-09-05 2025-04-09 - 10.0 Likely
CVE-2007-4000 2007-09-05 2025-04-09 - 8.5 Unknown
CVE-2007-4743 2007-09-06 2025-04-09 - 10.0 Likely
CVE-2007-5894 2007-12-06 2025-04-09 - 9.3 Likely
CVE-2007-5901 2007-12-06 2025-04-09 - 6.9 Unknown
CVE-2007-5902 2007-12-06 2025-04-09 - 10.0 Likely
CVE-2007-5971 2007-12-06 2025-04-09 - 6.9 Unknown
CVE-2007-5972 2007-12-06 2025-04-09 - 9.0 Likely
CVE-2008-0947 2008-03-19 2025-04-09 - 10.0 Likely
CVE-2008-0948 2008-03-19 2025-04-09 - 9.3 Likely
CVE-2008-0062 2008-03-19 2025-04-09 9.8 9.3 Likely
CVE-2008-0063 2008-03-19 2025-04-09 7.5 4.3 Likely
CVE-2009-0845 2009-03-27 2025-04-09 - 5.0 Likely
CVE-2009-0844 2009-04-09 2025-04-09 - 5.8 Likely
CVE-2009-0846 2009-04-09 2025-04-09 - 10.0 Likely
CVE-2009-0847 2009-04-09 2025-04-09 - 4.3 Likely
CVE-2009-3295 2009-12-29 2025-04-09 - 5.0 Likely
CVE-2009-4212 2010-01-13 2025-04-09 - 10.0 Likely
CVE-2010-0283 2010-02-22 2025-04-11 - 7.8 Likely
CVE-2010-0628 2010-03-25 2025-04-11 - 5.0 Likely
CVE-2010-0629 2010-04-07 2025-04-11 6.5 4.0 Likely
CVE-2010-1320 2010-04-22 2025-04-11 - 4.0 Likely
CVE-2010-1321 2010-05-19 2025-04-11 - 6.8 Likely
CVE-2010-1322 2010-10-07 2025-04-11 - 6.5 Likely
CVE-2010-1323 2010-12-02 2025-04-11 3.7 2.6 Unknown
CVE-2010-1324 2010-12-02 2025-04-11 3.7 4.3 Likely
CVE-2010-4020 2010-12-02 2025-04-11 6.3 3.5 Unknown
CVE-2010-4021 2010-12-02 2025-04-11 - 2.1 Unknown
CVE-2010-4022 2011-02-10 2025-04-11 - 5.0 Likely
CVE-2011-0281 2011-02-10 2025-04-11 - 5.0 Likely
CVE-2011-0282 2011-02-10 2025-04-11 - 5.0 Likely
CVE-2011-0283 2011-02-10 2025-04-11 - 5.0 Likely
CVE-2011-0284 2011-03-20 2025-04-11 - 7.6 Unknown
CVE-2011-0285 2011-04-15 2025-04-11 - 10.0 Likely
CVE-2011-1526 2011-07-11 2025-04-11 - 6.5 Likely
CVE-2011-1527 2011-10-20 2025-04-11 - 7.8 Likely
CVE-2011-1528 2011-10-20 2025-04-11 - 7.8 Likely
CVE-2011-1529 2011-10-20 2025-04-11 - 7.8 Likely
CVE-2011-4151 2011-10-20 2025-04-11 - 7.8 Likely
CVE-2011-1530 2011-12-08 2025-04-11 - 6.8 Likely
CVE-2011-4862 2011-12-25 2025-04-11 - 10.0 Likely
CVE-2012-1012 2012-06-07 2025-04-11 - 5.5 Likely
CVE-2012-1013 2012-06-07 2025-04-11 - 4.0 Likely
CVE-2012-1014 2012-08-06 2025-04-11 - 9.0 Likely
CVE-2012-1015 2012-08-06 2025-04-11 - 9.3 Likely
CVE-2012-1016 2013-03-05 2025-04-11 - 5.0 Likely
CVE-2013-1415 2013-03-05 2025-04-11 - 5.0 Likely
CVE-2013-1416 2013-04-19 2025-04-11 - 4.0 Likely
CVE-2002-2443 2013-05-29 2025-04-11 - 5.0 Likely
CVE-2013-6800 2013-11-18 2025-04-11 - 4.0 Likely
CVE-2013-1418 2013-11-18 2025-04-11 - 4.3 Likely
CVE-2013-1417 2013-11-20 2025-04-11 - 3.5 Unknown
CVE-2014-4341 2014-07-20 2025-04-12 - 5.0 Likely
CVE-2014-4342 2014-07-20 2025-04-12 - 5.0 Likely
CVE-2014-4343 2014-08-14 2025-04-12 - 7.6 Unknown
CVE-2014-4344 2014-08-14 2025-04-12 - 7.8 Likely
CVE-2014-4345 2014-08-14 2025-04-12 - 8.5 Unknown
CVE-2014-5351 2014-10-10 2025-04-12 - 2.1 Unknown
CVE-2014-5353 2014-12-16 2025-04-12 - 3.5 Unknown
CVE-2014-5354 2014-12-16 2025-04-12 - 3.5 Unknown
CVE-2014-5352 2015-02-19 2025-04-12 - 9.0 Likely
CVE-2014-9421 2015-02-19 2025-04-12 - 9.0 Likely
CVE-2014-9422 2015-02-19 2025-04-12 - 6.1 Unknown
CVE-2014-9423 2015-02-19 2025-04-12 - 5.0 Likely
CVE-2014-5355 2015-02-20 2025-04-12 - 5.0 Likely
CVE-2015-2694 2015-05-25 2025-04-12 - 5.8 Likely
CVE-2015-2695 2015-11-09 2025-04-12 - 5.0 Likely
CVE-2015-2696 2015-11-09 2025-04-12 - 7.1 Likely
CVE-2015-2697 2015-11-09 2025-04-12 - 4.0 Likely
CVE-2015-2698 2015-11-13 2025-04-12 - 8.5 Unknown
CVE-2015-8629 2016-02-13 2025-04-12 5.3 2.1 Unknown
CVE-2015-8630 2016-02-13 2025-04-12 7.5 5.0 Likely
CVE-2015-8631 2016-02-13 2025-04-12 6.5 4.0 Likely
CVE-2016-3119 2016-03-26 2025-04-12 5.3 3.5 Unknown
CVE-2016-3120 2016-08-01 2025-04-12 6.5 4.0 Likely
CVE-2017-11368 2017-08-09 2025-04-20 6.5 4.0 Likely
CVE-2017-11462 2017-09-13 2025-04-20 9.8 7.5 Likely
CVE-2017-15088 2017-11-23 2025-04-20 9.8 7.5 Likely
CVE-2018-5709 2018-01-16 2024-11-21 7.5 5.0 Likely
CVE-2018-5710 2018-01-16 2024-11-21 6.5 4.0 Likely
CVE-2018-5729 2018-03-06 2025-05-05 4.7 6.5 Likely
CVE-2018-5730 2018-03-06 2025-05-05 3.8 5.5 Likely
CVE-2017-7562 2018-07-26 2024-11-21 6.5 4.0 Likely
CVE-2018-20217 2018-12-26 2024-11-21 5.3 3.5 Unknown
CVE-2019-14844 2019-09-26 2024-11-21 7.5 5.0 Likely
CVE-2020-14000 2020-07-16 2024-11-21 9.8 7.5 Likely
CVE-2020-7750 2020-10-21 2024-11-21 9.6 6.8 Likely
CVE-2020-28196 2020-11-06 2025-12-03 7.5 5.0 Likely
CVE-2019-25017 2021-02-02 2024-11-21 5.9 5.8 Likely
CVE-2019-25018 2021-02-02 2024-11-21 7.5 5.0 Likely
CVE-2021-32471 2021-05-10 2024-11-21 7.8 7.2 Unknown
CVE-2021-36222 2021-07-22 2024-11-21 7.5 5.0 Likely
CVE-2021-37750 2021-08-23 2024-11-21 6.5 4.0 Likely
CVE-2020-27428 2022-01-06 2024-11-21 6.1 4.3 Likely
CVE-2022-39028 2022-08-30 2024-11-21 7.5 - -
CVE-2022-42898 2022-12-25 2025-04-14 8.8 - -
CVE-2023-36054 2023-08-07 2024-11-21 6.5 - -
CVE-2023-39975 2023-08-16 2026-02-25 8.8 - -
CVE-2024-26458 2024-02-29 2025-05-23 5.3 - -
CVE-2024-26461 2024-02-29 2025-05-23 7.5 - -
CVE-2024-26462 2024-02-29 2025-03-25 5.5 - -
CVE-2024-37370 2024-06-28 2026-02-18 7.5 - -
CVE-2024-37371 2024-06-28 2025-11-03 9.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mit by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mit's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.