Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

rapid7

About This Vendor

rapid7 is a technology vendor producing software and infrastructure products. As a software provider, rapid7's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of rapid7's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 75 known vulnerabilities from rapid7. This includes 28 high-severity issues requiring prompt remediation. These vulnerabilities affect 14 distinct products across rapid7's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2025, indicating decades of continuous security attention and research. Organizations deploying rapid7 products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-6493 2014-02-04 2025-04-11 - 6.8 Likely
CVE-2016-9757 2016-12-20 2025-04-12 5.4 3.5 Unknown
CVE-2017-5228 2017-03-02 2025-04-20 7.1 5.1 Unknown
CVE-2017-5229 2017-03-02 2025-04-20 7.1 5.1 Unknown
CVE-2017-5230 2017-03-02 2025-04-20 7.2 6.5 Likely
CVE-2017-5231 2017-03-02 2025-04-20 7.1 5.1 Unknown
CVE-2017-5232 2017-03-02 2025-04-20 7.8 6.8 Likely
CVE-2017-5233 2017-03-02 2025-04-20 7.8 6.8 Likely
CVE-2017-5234 2017-03-02 2025-04-20 7.8 6.8 Likely
CVE-2017-5235 2017-03-02 2025-04-20 7.8 6.8 Likely
CVE-2017-5236 2017-05-03 2025-04-20 7.8 6.8 Likely
CVE-2017-5240 2017-05-03 2025-04-20 7.5 5.0 Likely
CVE-2017-5243 2017-06-06 2025-04-20 8.5 6.8 Likely
CVE-2017-5244 2017-06-15 2025-04-20 3.5 3.5 Unknown
CVE-2017-15084 2017-10-06 2025-04-20 6.5 4.3 Likely
CVE-2017-5264 2017-12-14 2025-04-20 8.8 6.8 Likely
CVE-2018-5559 2018-11-28 2024-11-21 3.4 4.0 Likely
CVE-2019-5615 2019-04-09 2024-11-21 6.5 3.5 Unknown
CVE-2019-5624 2019-04-30 2024-11-21 7.3 6.5 Likely
CVE-2019-5630 2019-07-03 2024-11-21 5.9 6.8 Likely
CVE-2019-5629 2019-07-13 2024-11-21 7.8 7.2 Unknown
CVE-2019-5631 2019-08-19 2024-11-21 7.8 9.3 Likely
CVE-2019-5638 2019-08-21 2024-11-21 8.7 6.8 Likely
CVE-2019-5642 2019-11-06 2024-11-21 3.3 2.1 Unknown
CVE-2019-5647 2020-01-22 2024-11-21 4.4 3.6 Unknown
CVE-2012-6494 2020-01-25 2024-11-21 6.1 4.3 Likely
CVE-2020-7350 2020-04-22 2024-11-21 6.1 6.8 Likely
CVE-2020-7354 2020-06-25 2024-11-21 6.1 4.3 Likely
CVE-2020-7355 2020-06-25 2024-11-21 6.1 4.3 Likely
CVE-2020-7376 2020-08-24 2024-11-21 7.1 10.0 Likely
CVE-2020-7377 2020-08-24 2024-11-21 8.1 5.0 Likely
CVE-2019-5645 2020-09-01 2024-11-21 7.5 5.0 Likely
CVE-2020-7381 2020-09-03 2024-11-21 5.8 6.8 Likely
CVE-2020-7382 2020-09-03 2024-11-21 6.8 4.4 Unknown
CVE-2020-7358 2020-09-18 2024-11-21 5.8 4.4 Unknown
CVE-2020-7383 2020-10-14 2024-11-21 6.5 5.5 Likely
CVE-2020-7384 2020-10-29 2024-11-21 7.0 9.3 Likely
CVE-2020-7385 2021-04-23 2024-11-21 8.1 6.8 Likely
CVE-2021-3535 2021-06-16 2024-11-21 4.3 4.3 Likely
CVE-2021-3619 2021-07-22 2024-11-21 3.5 3.5 Unknown
CVE-2021-31868 2021-08-19 2024-11-21 4.3 5.5 Likely
CVE-2019-5640 2021-11-22 2024-11-21 3.3 5.0 Likely
CVE-2021-4007 2021-12-14 2024-11-21 7.8 7.2 Unknown
CVE-2021-4016 2022-01-21 2024-11-21 4.0 2.1 Unknown
CVE-2022-0237 2022-03-17 2024-11-21 4.0 7.2 Unknown
CVE-2022-0757 2022-03-17 2024-11-21 5.5 6.5 Likely
CVE-2022-0758 2022-03-17 2024-11-21 3.3 4.3 Likely
CVE-2022-35629 2022-07-29 2024-11-21 5.4 - -
CVE-2022-35630 2022-07-29 2024-11-21 6.1 - -
CVE-2022-35631 2022-07-29 2024-11-21 5.5 - -
CVE-2022-35632 2022-07-29 2024-11-21 4.8 - -
CVE-2019-5641 2022-09-21 2024-11-21 3.3 - -
CVE-2022-4261 2022-12-08 2024-11-21 4.4 - -
CVE-2017-5242 2023-01-12 2025-04-08 7.7 - -
CVE-2023-0242 2023-01-18 2025-04-03 8.8 - -
CVE-2023-0290 2023-01-18 2025-04-03 4.3 - -
CVE-2022-3913 2023-02-01 2024-11-21 5.3 - -
CVE-2023-0599 2023-02-01 2024-11-21 6.1 - -
CVE-2023-0681 2023-03-20 2024-11-21 4.3 - -
CVE-2023-1304 2023-03-21 2025-02-25 8.8 - -
CVE-2023-1305 2023-03-21 2025-02-26 8.1 - -
CVE-2023-1306 2023-03-21 2025-02-26 8.8 - -
CVE-2021-3844 2023-03-24 2024-11-21 5.7 - -
CVE-2023-1699 2023-03-30 2024-11-21 4.3 - -
CVE-2023-2226 2023-04-21 2024-11-21 3.3 - -
CVE-2023-2273 2023-04-26 2024-11-21 5.8 - -
CVE-2023-5950 2023-11-06 2024-11-21 8.6 - -
CVE-2024-2745 2024-04-02 2025-02-25 3.3 - -
CVE-2024-6504 2024-07-18 2025-09-05 4.3 - -
CVE-2024-8042 2024-09-09 2024-09-17 2.4 - -
CVE-2025-4951 2025-05-20 2025-12-11 4.6 - -
CVE-2025-6264 2025-06-20 2025-10-23 5.5 - -
CVE-2025-36857 2025-09-25 2025-12-11 3.3 - -
CVE-2025-11195 2025-09-30 2025-10-08 3.3 - -
CVE-2025-14728 2025-12-29 2026-02-20 6.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for rapid7 by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with rapid7's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.