Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
i-educar Vendor: portabilis

About This Product

i-educar is a software product offered by portabilis. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 93 known vulnerabilities affecting portabilis i-educar. This includes 6 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 45 medium-severity issues and 42 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-5578 2023-10-14 2025-10-02 3.5 4.0 Likely
CVE-2024-45057 2024-08-28 2024-09-13 6.1 - -
CVE-2024-45058 2024-08-28 2024-09-13 8.1 - -
CVE-2024-45059 2024-08-28 2024-09-13 8.8 - -
CVE-2024-48325 2024-11-06 2025-06-24 8.1 - -
CVE-2024-55239 2024-12-18 2025-07-03 5.4 - -
CVE-2024-12893 2024-12-22 2025-07-02 2.4 3.3 Unknown
CVE-2024-55651 2025-05-08 2025-06-17 5.4 - -
CVE-2025-7109 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7110 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7111 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7112 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7113 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7866 2025-07-20 2025-08-13 3.5 4.0 Likely
CVE-2025-7867 2025-07-20 2025-09-27 3.5 4.0 Likely
CVE-2025-7868 2025-07-20 2025-09-27 3.5 4.0 Likely
CVE-2025-7869 2025-07-20 2025-08-13 3.5 4.0 Likely
CVE-2025-8346 2025-07-31 2025-08-13 4.3 5.0 Likely
CVE-2025-8365 2025-07-31 2025-08-05 3.5 4.0 Likely
CVE-2025-8366 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8367 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8368 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8369 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8370 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8507 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8508 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8509 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8510 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8538 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8539 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8540 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8541 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8542 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8543 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8544 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8545 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8784 2025-08-09 2025-08-12 3.5 4.0 Likely
CVE-2025-8785 2025-08-10 2025-08-12 3.5 4.0 Likely
CVE-2025-8789 2025-08-10 2025-09-25 4.3 4.0 Likely
CVE-2025-8790 2025-08-10 2025-09-25 4.3 4.0 Likely
CVE-2025-8918 2025-08-13 2025-08-14 2.4 3.3 Unknown
CVE-2025-9236 2025-08-20 2025-09-04 6.3 6.5 Likely
CVE-2025-9531 2025-08-27 2025-09-04 6.3 6.5 Likely
CVE-2025-9532 2025-08-27 2025-09-04 6.3 6.5 Likely
CVE-2025-9606 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9607 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9608 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9609 2025-08-29 2025-09-04 6.3 6.5 Likely
CVE-2025-9652 2025-08-29 2025-09-04 3.5 4.0 Likely
CVE-2025-9653 2025-08-29 2025-09-04 3.5 4.0 Likely
CVE-2025-9684 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9685 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9686 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9687 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9720 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9721 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9722 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9723 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9724 2025-08-31 2025-09-03 3.5 4.0 Likely
CVE-2025-9738 2025-08-31 2025-09-27 3.5 4.0 Likely
CVE-2025-9760 2025-09-01 2025-09-27 6.3 6.5 Likely
CVE-2025-10011 2025-09-05 2025-09-26 6.3 6.5 Likely
CVE-2025-10012 2025-09-05 2025-09-08 6.3 6.5 Likely
CVE-2025-10013 2025-09-05 2025-09-08 6.3 6.5 Likely
CVE-2025-10070 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10071 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10072 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10073 2025-09-08 2025-09-09 4.3 4.0 Likely
CVE-2025-10074 2025-09-08 2025-09-09 3.5 4.0 Likely
CVE-2025-10099 2025-09-08 2025-09-11 2.4 3.3 Unknown
CVE-2025-10372 2025-09-13 2025-10-28 3.5 4.0 Likely
CVE-2025-10373 2025-09-13 2025-10-20 3.5 4.0 Likely
CVE-2025-10584 2025-09-17 2025-10-20 3.5 4.0 Likely
CVE-2025-10590 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10591 2025-09-17 2025-09-18 3.5 4.0 Likely
CVE-2025-10605 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10606 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10607 2025-09-17 2025-09-18 4.3 4.0 Likely
CVE-2025-10608 2025-09-17 2025-09-18 6.3 6.5 Likely
CVE-2025-10844 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-10845 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-10846 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-11047 2025-09-26 2025-10-07 6.3 6.5 Likely
CVE-2025-11048 2025-09-26 2025-10-07 6.3 6.5 Likely
CVE-2025-11049 2025-09-27 2025-10-03 6.3 6.5 Likely
CVE-2025-11050 2025-09-27 2025-10-03 6.3 6.5 Likely
CVE-2025-11554 2025-10-09 2025-11-21 6.3 6.5 Likely
CVE-2025-65022 2025-11-19 2025-11-20 7.2 - -
CVE-2025-65023 2025-11-19 2025-11-20 7.2 - -
CVE-2025-65024 2025-11-19 2025-11-20 7.2 - -
CVE-2025-9638 2025-12-09 2025-12-11 4.8 - -
CVE-2026-2015 2026-02-06 2026-02-10 6.3 6.5 Likely
CVE-2026-2064 2026-02-06 2026-02-11 3.5 4.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for portabilis i-educar by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.