Xymon
by Xymon
Standard maintenance is sufficient
Xymon has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
14.3%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
7.1%
Based on 14 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2016-2055 | 7.5 | 68.0% | — |
| CVE-2016-2056 | 8.8 | 56.3% | — |
| CVE-2016-2054 | 9.8 | 4.1% | — |
| CVE-2019-13455 | 9.8 | 1.0% | — |
| CVE-2019-13485 | 9.8 | 1.0% | — |
| CVE-2019-13486 | 9.8 | 1.0% | — |
| CVE-2019-13484 | 9.8 | 1.0% | — |
| CVE-2019-13451 | 9.8 | 1.0% | — |
| CVE-2019-13452 | 9.8 | 1.0% | — |
| CVE-2019-13273 | 9.8 | 0.5% | — |
| CVE-2015-1430 | 9.8 | 0.4% | — |
| CVE-2019-13274 | 6.1 | 0.2% | — |
| CVE-2016-2058 | 5.4 | 0.2% | — |
| CVE-2016-2057 | 3.3 | 0.1% | — |
10
/ 100
low-risk
Active Threat
8/50 · Minimal
Exploit Availability
2/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.