Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

sco

About This Vendor

sco is a technology vendor producing software and infrastructure products. As a software provider, sco's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of sco's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 129 known vulnerabilities from sco. This includes 1 critical-severity issue and 65 high-severity issues that represent significant risk. These vulnerabilities affect 166 distinct products across sco's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1993 through 2011, indicating decades of continuous security attention and research. Organizations deploying sco products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1162 1993-05-24 2025-04-03 - 6.4 Likely
CVE-1999-1138 1993-09-17 2025-04-03 - 10.0 Likely
CVE-1999-1302 1994-11-30 2025-04-03 - 7.2 Unknown
CVE-1999-1303 1994-11-30 2025-04-03 - 7.2 Unknown
CVE-1999-1304 1994-11-30 2025-04-03 - 7.2 Unknown
CVE-1999-1305 1994-11-30 2025-04-03 - 7.2 Unknown
CVE-1999-0078 1996-04-18 2025-04-03 - 1.9 Unknown
CVE-1999-0019 1996-04-24 2025-04-03 - 5.0 Likely
CVE-1999-1253 1996-06-07 2025-04-03 - 7.2 Unknown
CVE-1999-0023 1996-07-24 2025-04-03 - 7.2 Unknown
CVE-1999-1252 1996-09-04 2025-04-03 - 7.2 Unknown
CVE-1999-0131 1996-09-11 2025-04-03 - 7.2 Unknown
CVE-1999-0129 1996-12-03 2025-04-03 - 4.6 Unknown
CVE-1999-0096 1996-12-10 2025-04-03 - 5.0 Likely
CVE-1999-0128 1996-12-18 2025-04-03 - 5.0 Likely
CVE-1999-0345 1997-01-01 2025-04-03 - 5.0 Likely
CVE-1999-0033 1997-06-12 2025-04-03 - 7.2 Unknown
CVE-1999-0153 1997-07-01 2025-04-03 - 5.0 Likely
CVE-1999-0524 1997-08-01 2025-04-03 - 2.1 Unknown
CVE-1999-0024 1997-08-13 2025-04-03 - 5.0 Likely
CVE-1999-1209 1997-11-20 2025-04-03 - 7.2 Unknown
CVE-1999-0017 1997-12-10 2025-04-03 - 7.5 Likely
CVE-1999-0004 1997-12-16 2025-04-03 - 5.0 Likely
CVE-1999-0009 1998-04-08 2025-04-03 - 10.0 Likely
CVE-1999-0010 1998-04-08 2025-04-03 - 5.0 Likely
CVE-1999-0011 1998-04-08 2025-04-09 5.4 10.0 Likely
CVE-1999-1041 1998-08-27 2025-04-03 - 7.2 Unknown
CVE-1999-1185 1998-10-06 2025-04-03 - 7.2 Unknown
CVE-1999-0836 1998-12-02 2025-04-03 - 10.0 Likely
CVE-1999-0798 1998-12-04 2025-04-03 - 10.0 Likely
CVE-1999-1450 1999-01-27 2025-04-03 - 7.5 Likely
CVE-1999-0368 1999-02-09 2025-04-03 - 10.0 Likely
CVE-1999-0476 1999-03-01 2025-04-03 - 7.2 Unknown
CVE-1999-0411 1999-03-07 2025-04-03 - 7.2 Unknown
CVE-1999-0697 1999-09-09 2025-04-03 - 7.2 Unknown
CVE-1999-0942 1999-10-04 2025-04-03 - 7.2 Unknown
CVE-1999-0893 1999-10-11 2025-04-03 - 2.1 Unknown
CVE-1999-0830 1999-11-01 2025-04-03 - 7.2 Unknown
CVE-1999-1571 1999-11-04 2025-04-03 - 7.2 Unknown
CVE-1999-0835 1999-11-10 2025-04-03 - 10.0 Likely
CVE-1999-0851 1999-11-10 2025-04-03 - 2.1 Unknown
CVE-1999-0845 1999-11-25 2025-04-03 - 7.2 Unknown
CVE-1999-0828 1999-12-02 2025-04-03 - 3.6 Unknown
CVE-1999-0825 1999-12-03 2025-04-03 - 3.6 Unknown
CVE-1999-0864 1999-12-03 2025-04-03 - 7.2 Unknown
CVE-1999-0866 1999-12-03 2025-04-03 - 7.2 Unknown
CVE-1999-0988 1999-12-04 2025-04-03 - 7.2 Unknown
CVE-2000-0026 1999-12-21 2025-04-03 - 10.0 Likely
CVE-2000-0029 1999-12-27 2025-04-03 - 4.6 Unknown
CVE-2000-0003 1999-12-30 2025-04-03 - 10.0 Likely
CVE-2000-0099 2000-01-18 2025-04-03 - 7.2 Unknown
CVE-2000-0130 2000-01-27 2025-04-03 - 7.2 Unknown
CVE-2000-0147 2000-02-08 2025-04-03 - 2.1 Unknown
CVE-2000-0215 2000-02-08 2025-04-03 - 7.2 Unknown
CVE-2000-0224 2000-02-15 2025-04-03 - 1.2 Unknown
CVE-2000-0154 2000-02-16 2025-04-03 - 1.2 Unknown
CVE-2000-0158 2000-02-16 2025-04-03 - 7.5 Likely
CVE-1999-0693 2000-03-02 2025-04-03 - 7.2 Unknown
CVE-2000-0173 2000-03-10 2025-04-03 - 5.0 Likely
CVE-1999-0979 2000-04-11 2025-04-03 - 7.2 Unknown
CVE-2000-0842 2000-11-14 2025-04-03 - 5.0 Likely
CVE-2000-1014 2000-12-11 2025-04-03 - 7.5 Likely
CVE-2000-0306 2001-03-12 2025-04-03 - 10.0 Likely
CVE-2000-0307 2001-03-12 2025-04-03 - 5.0 Likely
CVE-2000-0308 2001-03-12 2025-04-03 - 10.0 Likely
CVE-2000-0348 2001-03-12 2025-04-03 - 10.0 Likely
CVE-2000-0349 2001-03-12 2025-04-03 - 5.0 Likely
CVE-2000-0351 2001-03-12 2025-04-03 - 4.6 Unknown
CVE-2001-1148 2001-06-13 2025-04-03 - 4.6 Unknown
CVE-2001-0575 2001-08-22 2025-04-03 - 4.6 Unknown
CVE-2001-0576 2001-08-22 2025-04-03 - 4.6 Unknown
CVE-2001-0577 2001-08-22 2025-04-03 - 7.2 Unknown
CVE-2001-0578 2001-08-22 2025-04-03 - 4.6 Unknown
CVE-2001-0579 2001-08-22 2025-04-03 - 7.5 Likely
CVE-2001-0587 2001-08-22 2025-04-03 - 7.2 Unknown
CVE-2001-0588 2001-08-22 2025-04-03 - 4.6 Unknown
CVE-2001-0627 2001-08-22 2025-04-03 - 3.7 Unknown
CVE-2001-0896 2001-11-30 2025-04-03 - 5.0 Likely
CVE-2001-0797 2001-12-12 2025-04-03 - 10.0 Likely
CVE-2001-1508 2001-12-31 2025-04-03 - 4.6 Unknown
CVE-2001-1578 2001-12-31 2025-04-03 - 2.1 Unknown
CVE-2001-1579 2001-12-31 2025-04-03 - 5.0 Likely
CVE-2002-0716 2002-07-26 2025-04-03 - 7.2 Unknown
CVE-2002-1199 2002-10-28 2025-04-03 - 5.0 Likely
CVE-2002-1323 2002-12-11 2025-04-03 - 4.6 Unknown
CVE-2002-1998 2002-12-31 2025-04-03 - 7.5 Likely
CVE-2003-0282 2003-06-16 2025-04-03 - 2.6 Unknown
CVE-2003-0597 2003-08-27 2025-04-03 - 7.2 Unknown
CVE-2003-0742 2003-10-06 2025-04-03 - 7.2 Unknown
CVE-2003-0791 2003-10-07 2025-04-03 9.8 7.5 Likely
CVE-2003-0658 2003-10-20 2025-04-03 - 5.0 Likely
CVE-2003-0872 2003-11-17 2025-04-03 - 2.1 Unknown
CVE-2003-0834 2003-12-01 2025-04-03 - 7.2 Unknown
CVE-2003-0914 2003-12-15 2025-04-03 - 4.3 Likely
CVE-2003-0937 2003-12-15 2025-04-03 - 4.6 Unknown
CVE-2004-1124 2004-01-14 2025-04-03 - 4.6 Unknown
CVE-2004-1082 2004-02-03 2025-04-03 - 7.5 Likely
CVE-2004-0079 2004-11-23 2025-04-03 7.5 5.0 Likely
CVE-2004-0081 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-0112 2004-11-23 2025-04-03 - 5.0 Likely
CVE-2004-1307 2004-12-21 2025-04-03 - 7.5 Likely
CVE-2004-0510 2004-12-23 2025-04-03 - 7.2 Unknown
CVE-2004-0511 2004-12-23 2025-04-03 - 2.1 Unknown
CVE-2004-0512 2004-12-23 2025-04-03 - 2.1 Unknown
CVE-2004-0390 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2004-0996 2005-01-10 2025-04-03 - 2.1 Unknown
CVE-2004-1039 2005-01-11 2025-04-03 - 5.0 Likely
CVE-2003-1021 2005-01-26 2025-04-03 - 7.2 Unknown
CVE-2004-1131 2005-02-07 2025-04-03 - 7.2 Unknown
CVE-2005-0109 2005-03-05 2025-04-03 5.6 4.7 Unknown
CVE-2005-0351 2005-04-07 2025-04-03 - 4.6 Unknown
CVE-2005-0993 2005-05-02 2025-04-03 - 4.6 Unknown
CVE-2005-0134 2005-05-18 2025-04-03 - 4.6 Unknown
CVE-2005-2132 2005-08-03 2025-04-03 - 2.1 Unknown
CVE-2005-2926 2005-10-25 2025-04-03 - 4.6 Unknown
CVE-2005-2927 2005-10-25 2025-04-03 - 7.2 Unknown
CVE-2005-3903 2005-12-14 2025-04-03 - 4.6 Unknown
CVE-2005-2934 2005-12-31 2025-04-03 - 7.2 Unknown
CVE-2005-3624 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2005-3625 2005-12-31 2025-04-03 - 10.0 Likely
CVE-2005-3626 2005-12-31 2025-04-03 - 5.0 Likely
CVE-2006-0072 2006-01-04 2025-04-03 - 7.5 Likely
CVE-2006-4655 2006-09-09 2025-04-03 - 4.6 Unknown
CVE-2008-1343 2008-03-17 2025-04-09 - 4.9 Unknown
CVE-2008-0310 2008-04-07 2025-04-09 - 6.9 Unknown
CVE-2008-6558 2009-03-30 2025-04-09 - 7.2 Unknown
CVE-2008-6559 2009-03-30 2025-04-09 - 7.2 Unknown
CVE-2009-1552 2009-05-06 2025-04-09 - 7.8 Likely
CVE-2011-1432 2011-03-16 2025-04-11 - 6.8 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for sco by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with sco's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.