Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

zimbra

About This Vendor

zimbra is a technology vendor producing software and infrastructure products. As a software provider, zimbra's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of zimbra's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 59 known vulnerabilities from zimbra. This includes 4 critical-severity issues and 14 high-severity issues that represent significant risk. These vulnerabilities affect 8 distinct products across zimbra's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2025, indicating decades of continuous security attention and research. Organizations deploying zimbra products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-1226 2008-03-10 2025-04-09 - 4.3 Likely
CVE-2012-1213 2012-02-24 2025-04-11 - 4.3 Likely
CVE-2013-7217 2013-12-26 2025-04-11 - 10.0 Likely
CVE-2015-6541 2016-04-08 2025-04-12 8.8 6.8 Likely
CVE-2016-5721 2016-08-29 2025-04-12 6.1 4.3 Likely
CVE-2015-7610 2018-05-30 2024-11-21 8.8 6.8 Likely
CVE-2018-10939 2018-05-30 2024-11-21 6.1 4.3 Likely
CVE-2019-12427 2020-01-27 2024-11-21 4.8 3.5 Unknown
CVE-2019-15313 2020-01-27 2024-11-21 6.1 4.3 Likely
CVE-2019-8945 2020-01-27 2024-11-21 6.1 4.3 Likely
CVE-2019-8946 2020-01-27 2024-11-21 6.1 4.3 Likely
CVE-2019-8947 2020-01-27 2024-11-21 6.1 4.3 Likely
CVE-2013-1938 2020-02-12 2024-11-21 6.1 4.3 Likely
CVE-2020-10194 2020-03-20 2024-11-21 6.5 4.0 Likely
CVE-2020-11737 2020-05-05 2024-11-21 6.1 4.3 Likely
CVE-2020-35123 2020-12-17 2024-11-21 6.5 4.0 Likely
CVE-2021-34807 2021-07-02 2024-11-21 6.1 5.8 Likely
CVE-2021-35207 2021-07-02 2024-11-21 6.1 4.3 Likely
CVE-2021-35208 2021-07-02 2024-11-21 5.4 3.5 Unknown
CVE-2021-35209 2021-07-02 2024-11-21 9.8 7.5 Likely
CVE-2022-32294 2022-07-11 2024-11-21 9.8 7.5 Likely
CVE-2022-37041 2022-08-12 2024-11-21 7.5 - -
CVE-2022-37043 2022-08-12 2024-11-21 5.7 - -
CVE-2022-37044 2022-08-12 2024-11-21 6.1 - -
CVE-2022-37393 2022-08-16 2024-11-21 7.8 - -
CVE-2022-41347 2022-09-26 2025-05-21 7.8 - -
CVE-2022-41348 2022-10-12 2025-05-15 6.1 - -
CVE-2022-41349 2022-10-12 2025-05-15 6.1 - -
CVE-2022-41350 2022-10-12 2025-05-15 6.1 - -
CVE-2022-41351 2022-10-12 2025-05-15 6.1 - -
CVE-2022-45912 2022-12-05 2025-04-24 7.2 - -
CVE-2022-45911 2023-01-06 2025-04-09 6.1 - -
CVE-2022-45913 2023-01-06 2025-04-09 6.1 - -
CVE-2023-24030 2023-06-15 2024-11-21 6.1 - -
CVE-2023-24031 2023-06-15 2024-11-21 6.1 - -
CVE-2023-24032 2023-06-15 2024-11-21 7.8 - -
CVE-2023-29381 2023-07-06 2024-11-21 9.8 - -
CVE-2023-29382 2023-07-06 2024-11-21 9.8 - -
CVE-2023-34193 2023-07-06 2024-11-21 8.8 - -
CVE-2023-38750 2023-07-31 2024-11-21 7.5 - -
CVE-2023-41106 2023-12-07 2024-11-21 7.5 - -
CVE-2023-43102 2023-12-07 2024-11-21 6.1 - -
CVE-2023-43103 2023-12-07 2024-11-21 6.1 - -
CVE-2017-20188 2024-01-02 2024-11-21 2.6 2.1 Unknown
CVE-2023-26562 2024-02-13 2024-11-21 6.5 - -
CVE-2023-45206 2024-02-13 2025-05-07 6.1 - -
CVE-2023-45207 2024-02-13 2025-03-27 6.1 - -
CVE-2023-48432 2024-02-13 2025-03-25 6.1 - -
CVE-2023-50808 2024-02-13 2024-11-21 6.1 - -
CVE-2024-27442 2024-08-12 2024-08-13 7.8 - -
CVE-2024-27443 2024-08-12 2025-10-31 6.1 - -
CVE-2024-33533 2024-08-12 2025-03-13 5.4 - -
CVE-2024-33535 2024-08-12 2025-03-19 7.5 - -
CVE-2024-33536 2024-08-12 2025-03-25 5.4 - -
CVE-2024-45518 2024-10-22 2024-10-30 8.8 - -
CVE-2024-9665 2024-11-22 2025-01-03 6.5 - -
CVE-2025-27914 2025-03-12 2025-04-02 5.4 - -
CVE-2024-45515 2025-07-30 2025-08-07 6.1 - -
CVE-2025-67809 2025-12-15 2025-12-30 4.7 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for zimbra by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with zimbra's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.