Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
hospital_management_system Vendor: phpgurukul

About This Product

hospital_management_system is a software product offered by phpgurukul. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 61 known vulnerabilities affecting phpgurukul hospital_management_system. This includes 6 critical-severity issues and 24 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2026, indicating a sustained research interest and ongoing security attention. 29 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-5191 2020-01-06 2024-11-21 6.1 4.3 Likely
CVE-2020-5192 2020-01-06 2024-11-21 8.8 6.5 Likely
CVE-2020-5193 2020-01-14 2024-11-21 6.1 4.3 Likely
CVE-2020-25271 2020-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2020-35745 2021-01-07 2024-11-21 8.8 6.5 Likely
CVE-2020-22164 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22165 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22166 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22167 2021-06-22 2024-11-21 5.4 3.5 Unknown
CVE-2020-22168 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22169 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22170 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22171 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22172 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22173 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22174 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22175 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2020-22176 2021-06-22 2024-11-21 7.5 5.0 Likely
CVE-2021-39411 2021-11-05 2024-11-21 6.1 4.3 Likely
CVE-2022-24263 2022-01-31 2024-11-21 9.8 7.5 Likely
CVE-2022-24646 2022-02-10 2024-11-21 7.5 7.8 Likely
CVE-2022-24226 2022-02-15 2024-11-21 7.5 5.0 Likely
CVE-2022-42205 2022-10-21 2025-05-08 5.4 - -
CVE-2022-42206 2022-10-21 2025-05-08 5.4 - -
CVE-2021-35387 2022-10-28 2025-05-07 8.8 - -
CVE-2021-35388 2022-10-28 2025-05-07 5.4 - -
CVE-2023-31498 2023-05-11 2025-01-27 9.8 - -
CVE-2023-7172 2023-12-30 2024-11-21 7.3 7.5 Likely
CVE-2023-7173 2023-12-30 2024-11-21 4.3 5.0 Likely
CVE-2024-0286 2024-01-07 2024-11-21 4.3 5.0 Likely
CVE-2024-0360 2024-01-10 2024-11-21 5.5 5.2 Unknown
CVE-2024-0361 2024-01-10 2024-11-21 5.5 5.2 Unknown
CVE-2024-0362 2024-01-10 2024-11-21 5.5 5.2 Unknown
CVE-2024-0363 2024-01-10 2024-11-21 5.5 5.2 Unknown
CVE-2024-0364 2024-01-10 2024-11-21 5.5 5.2 Unknown
CVE-2020-26627 2024-01-10 2025-06-03 4.9 - -
CVE-2020-26628 2024-01-10 2025-06-20 6.1 - -
CVE-2020-26629 2024-01-10 2025-05-09 9.8 - -
CVE-2020-26630 2024-01-10 2025-05-22 4.9 - -
CVE-2022-46497 2024-03-07 2025-03-28 8.1 - -
CVE-2022-46498 2024-03-07 2025-03-28 2.7 - -
CVE-2022-46499 2024-03-07 2025-03-28 8.8 - -
CVE-2024-46237 2024-10-09 2024-10-22 5.4 - -
CVE-2024-46238 2024-10-21 2025-03-31 5.9 - -
CVE-2024-46239 2024-10-21 2025-03-31 5.9 - -
CVE-2024-11675 2024-11-26 2024-12-04 3.5 4.0 Likely
CVE-2024-56997 2025-01-21 2025-04-09 4.2 - -
CVE-2024-56998 2025-01-21 2025-04-09 4.2 - -
CVE-2024-56990 2025-01-21 2025-04-09 4.5 - -
CVE-2024-51360 2025-05-23 2025-05-29 9.8 - -
CVE-2025-7176 2025-07-08 2025-07-08 7.3 7.5 Likely
CVE-2025-7604 2025-07-14 2025-07-16 7.3 7.5 Likely
CVE-2025-56212 2025-08-25 2025-09-02 9.8 - -
CVE-2025-56214 2025-08-25 2025-09-02 9.8 - -
CVE-2025-56215 2025-08-25 2025-09-02 6.5 - -
CVE-2025-56216 2025-08-25 2025-09-02 8.5 - -
CVE-2026-1550 2026-01-28 2026-02-09 6.3 6.5 Likely
CVE-2026-2134 2026-02-08 2026-02-11 4.7 5.8 Unknown
CVE-2026-2179 2026-02-08 2026-02-10 4.7 5.8 Unknown
CVE-2025-70062 2026-02-18 2026-02-23 6.5 - -
CVE-2025-70064 2026-02-18 2026-02-23 8.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for phpgurukul hospital_management_system by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.