Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

openexr

About This Vendor

openexr is a technology vendor producing software and infrastructure products. As a software provider, openexr's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of openexr's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 62 known vulnerabilities from openexr. This includes 2 critical-severity issues and 17 high-severity issues that represent significant risk. These vulnerabilities affect 14 distinct products across openexr's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2026, indicating decades of continuous security attention and research. Organizations deploying openexr products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-1720 2009-07-31 2025-04-09 - 7.5 Likely
CVE-2009-1721 2009-07-31 2025-04-09 - 6.8 Likely
CVE-2009-1722 2009-07-31 2025-04-09 - 6.8 Likely
CVE-2017-9110 2017-05-21 2025-04-20 6.5 4.3 Likely
CVE-2017-9111 2017-05-21 2025-04-20 8.8 6.8 Likely
CVE-2017-9112 2017-05-21 2025-04-20 6.5 4.3 Likely
CVE-2017-9113 2017-05-21 2025-04-20 8.8 4.3 Likely
CVE-2017-9114 2017-05-21 2025-04-20 6.5 4.3 Likely
CVE-2017-9115 2017-05-21 2025-04-20 8.8 6.8 Likely
CVE-2017-9116 2017-05-21 2025-04-20 6.5 4.3 Likely
CVE-2017-12596 2017-08-07 2025-04-20 7.8 6.8 Likely
CVE-2017-14988 2017-10-03 2025-04-20 5.5 4.3 Likely
CVE-2020-11758 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11759 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11760 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11761 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11762 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11763 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11764 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-11765 2020-04-14 2024-11-21 5.5 4.3 Likely
CVE-2020-15304 2020-06-26 2024-11-21 5.5 2.1 Unknown
CVE-2020-15305 2020-06-26 2024-11-21 5.5 2.1 Unknown
CVE-2020-15306 2020-06-26 2024-11-21 5.5 2.1 Unknown
CVE-2020-16587 2020-12-09 2024-11-21 5.5 4.3 Likely
CVE-2020-16588 2020-12-09 2024-11-21 5.5 4.3 Likely
CVE-2020-16589 2020-12-09 2024-11-21 5.5 4.3 Likely
CVE-2021-3474 2021-03-30 2024-11-21 5.3 5.0 Likely
CVE-2021-3475 2021-03-30 2024-11-21 5.3 5.0 Likely
CVE-2021-3476 2021-03-30 2024-11-21 5.3 5.0 Likely
CVE-2021-3477 2021-03-31 2024-11-21 5.5 4.3 Likely
CVE-2021-3478 2021-03-31 2024-11-21 5.5 4.3 Likely
CVE-2021-3479 2021-03-31 2024-11-21 5.5 4.3 Likely
CVE-2021-20296 2021-04-01 2024-11-21 5.3 5.0 Likely
CVE-2021-23169 2021-06-08 2024-11-21 8.8 6.8 Likely
CVE-2021-23215 2021-06-08 2024-11-21 5.5 4.3 Likely
CVE-2021-26260 2021-06-08 2024-11-21 5.5 4.3 Likely
CVE-2021-26945 2021-06-08 2024-11-21 5.5 4.3 Likely
CVE-2021-3598 2021-07-06 2024-11-21 5.5 2.1 Unknown
CVE-2021-3605 2021-08-25 2024-11-21 5.5 4.3 Likely
CVE-2021-45942 2022-01-01 2024-11-21 5.5 4.3 Likely
CVE-2021-20300 2022-03-04 2024-11-21 5.5 7.1 Likely
CVE-2021-20302 2022-03-04 2024-11-21 5.5 7.1 Likely
CVE-2021-20303 2022-03-04 2024-11-21 6.1 5.8 Likely
CVE-2021-20299 2022-03-16 2024-11-21 7.5 4.3 Likely
CVE-2021-3933 2022-03-25 2024-11-21 5.5 4.3 Likely
CVE-2021-3941 2022-03-25 2024-11-21 6.5 2.1 Unknown
CVE-2021-20298 2022-08-23 2024-11-21 7.5 - -
CVE-2021-20304 2022-08-23 2024-11-21 7.5 - -
CVE-2023-5841 2024-02-01 2025-11-04 9.1 - -
CVE-2024-31047 2024-04-08 2025-08-13 3.3 - -
CVE-2025-48071 2025-07-31 2025-08-13 7.8 - -
CVE-2025-48072 2025-07-31 2025-08-13 9.1 - -
CVE-2025-48073 2025-07-31 2025-08-13 6.2 - -
CVE-2025-48074 2025-08-01 2025-08-13 5.5 - -
CVE-2025-64181 2025-11-10 2025-12-08 7.5 - -
CVE-2025-64182 2025-11-10 2025-12-08 7.8 - -
CVE-2025-64183 2025-11-10 2025-12-08 7.5 - -
CVE-2025-12495 2025-12-23 2026-01-15 7.8 - -
CVE-2025-12839 2025-12-23 2026-01-15 7.8 - -
CVE-2025-12840 2025-12-23 2026-01-15 7.8 - -
CVE-2026-26981 2026-02-24 2026-02-25 6.5 - -
CVE-2026-27622 2026-03-03 2026-03-05 7.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for openexr by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with openexr's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.