Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
tutor_lms Vendor: themeum

About This Product

tutor_lms is a software product offered by themeum. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 49 known vulnerabilities affecting themeum tutor_lms. This includes 2 critical-severity issues and 15 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2025, indicating a recent active security attention. 31 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-8615 2020-02-04 2024-11-21 6.5 2.6 Unknown
CVE-2021-24181 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24182 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24183 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24184 2021-04-05 2024-11-21 8.8 6.5 Likely
CVE-2021-24185 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24186 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24242 2021-04-22 2024-11-21 3.8 5.5 Likely
CVE-2021-24455 2021-08-02 2024-11-21 5.4 3.5 Unknown
CVE-2021-24740 2021-10-18 2024-11-21 4.8 3.5 Unknown
CVE-2021-24873 2021-11-23 2024-11-21 6.1 4.3 Likely
CVE-2021-25017 2022-01-24 2024-11-21 6.1 4.3 Likely
CVE-2022-2563 2022-10-17 2025-05-13 4.8 - -
CVE-2023-0236 2023-02-06 2025-03-25 6.1 - -
CVE-2023-3133 2023-07-04 2024-11-21 7.5 - -
CVE-2023-4805 2023-10-16 2025-04-23 5.4 - -
CVE-2023-25700 2023-11-03 2024-11-21 9.8 - -
CVE-2023-25800 2023-11-03 2024-11-21 8.8 - -
CVE-2023-25990 2023-11-03 2024-11-21 8.8 - -
CVE-2023-49829 2023-12-15 2024-11-21 5.9 - -
CVE-2024-1128 2024-02-29 2025-01-15 5.4 - -
CVE-2024-1133 2024-02-29 2025-01-15 4.3 - -
CVE-2024-1751 2024-03-13 2025-01-15 8.8 - -
CVE-2024-1502 2024-03-21 2025-01-15 5.4 - -
CVE-2024-1503 2024-03-21 2025-01-15 4.3 - -
CVE-2024-3994 2024-04-25 2025-01-15 5.4 - -
CVE-2024-3553 2024-05-02 2025-01-15 6.5 - -
CVE-2024-4279 2024-05-16 2025-01-24 6.5 - -
CVE-2024-4318 2024-05-16 2025-01-24 8.8 - -
CVE-2024-4223 2024-05-16 2025-01-24 9.8 - -
CVE-2024-4222 2024-05-16 2025-01-22 7.3 - -
CVE-2024-4351 2024-05-16 2025-01-22 8.8 - -
CVE-2024-4352 2024-05-16 2025-01-22 8.8 - -
CVE-2024-4902 2024-06-07 2024-11-21 7.2 - -
CVE-2024-5438 2024-06-07 2024-11-21 4.3 - -
CVE-2023-25799 2024-06-11 2024-11-21 8.3 - -
CVE-2024-37256 2024-07-09 2024-11-21 7.6 - -
CVE-2024-37266 2024-07-09 2024-11-21 4.9 - -
CVE-2024-37947 2024-07-20 2025-02-03 5.9 - -
CVE-2024-43231 2024-08-12 2025-01-22 6.5 - -
CVE-2024-43282 2024-08-18 2025-01-22 7.6 - -
CVE-2024-39645 2024-08-26 2024-09-18 5.4 - -
CVE-2024-5784 2024-08-30 2025-07-11 7.1 - -
CVE-2023-2919 2024-09-10 2024-09-26 4.3 - -
CVE-2024-43142 2024-11-01 2025-04-04 4.3 - -
CVE-2024-10393 2024-11-21 2025-01-23 5.3 - -
CVE-2024-10400 2024-11-21 2025-01-23 7.5 - -
CVE-2025-11564 2025-10-25 2025-12-05 5.3 - -
CVE-2025-6680 2025-10-25 2025-12-05 4.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for themeum tutor_lms by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.