Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ashlar

About This Vendor

ashlar is a technology vendor producing software and infrastructure products. As a software provider, ashlar's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ashlar's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 101 known vulnerabilities from ashlar. This includes 2 critical-severity issues and 99 high-severity issues that represent significant risk. These vulnerabilities affect 6 distinct products across ashlar's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2023 through 2025, with recent active disclosure activity. Organizations deploying ashlar products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-39427 2023-10-26 2025-08-08 7.8 - -
CVE-2023-39936 2023-10-26 2024-11-21 7.8 - -
CVE-2023-34286 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34287 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34288 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34289 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34290 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34291 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34292 2024-05-03 2025-08-07 7.8 - -
CVE-2023-34293 2024-05-03 2025-08-07 8.8 - -
CVE-2023-34299 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34300 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34301 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34302 2024-05-03 2025-06-04 7.8 - -
CVE-2023-34303 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34304 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34305 2024-05-03 2025-08-08 7.0 - -
CVE-2023-34306 2024-05-03 2025-08-07 8.8 - -
CVE-2023-34307 2024-05-03 2025-08-07 8.8 - -
CVE-2023-34308 2024-05-03 2025-08-07 8.8 - -
CVE-2023-34309 2024-05-03 2025-08-08 7.8 - -
CVE-2023-34310 2024-05-03 2025-08-25 7.8 - -
CVE-2023-34311 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35709 2024-05-03 2025-08-25 7.8 - -
CVE-2023-35710 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35711 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35712 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35713 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35714 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35715 2024-05-03 2025-08-08 7.8 - -
CVE-2023-35716 2024-05-03 2025-08-08 7.8 - -
CVE-2023-42101 2024-05-03 2025-08-08 7.8 - -
CVE-2023-42102 2024-05-03 2025-08-08 7.8 - -
CVE-2023-42103 2024-05-03 2025-08-08 7.8 - -
CVE-2023-42104 2024-05-03 2025-08-08 7.8 - -
CVE-2023-42105 2024-05-03 2025-08-25 7.8 - -
CVE-2023-44437 2024-05-03 2025-08-08 7.8 - -
CVE-2023-44438 2024-05-03 2025-08-18 8.8 - -
CVE-2023-44439 2024-05-03 2025-08-18 8.8 - -
CVE-2023-44440 2024-05-03 2025-08-18 8.8 - -
CVE-2024-13044 2024-12-30 2025-08-08 7.8 - -
CVE-2024-13045 2024-12-30 2025-08-08 7.8 - -
CVE-2024-13046 2024-12-30 2025-08-15 7.8 - -
CVE-2024-13047 2024-12-30 2025-08-08 7.8 - -
CVE-2024-13048 2024-12-30 2025-08-08 7.8 - -
CVE-2024-13049 2024-12-30 2025-08-08 7.8 - -
CVE-2024-13050 2024-12-30 2025-01-03 7.8 - -
CVE-2024-13051 2024-12-30 2025-01-03 7.8 - -
CVE-2023-39943 2025-02-04 2025-09-16 7.8 - -
CVE-2023-40222 2025-02-04 2025-09-16 7.8 - -
CVE-2025-2012 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2013 2025-03-11 2025-08-15 7.8 - -
CVE-2025-2014 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2015 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2016 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2017 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2018 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2019 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2020 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2021 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2022 2025-03-11 2025-08-08 7.8 - -
CVE-2025-2023 2025-03-11 2025-08-08 7.8 - -
CVE-2025-41392 2025-08-18 2025-11-28 7.8 - -
CVE-2025-53705 2025-08-18 2025-11-28 7.8 - -
CVE-2025-46269 2025-08-18 2025-11-28 7.8 - -
CVE-2025-52584 2025-08-18 2025-11-28 7.8 - -
CVE-2025-7977 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7978 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7979 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7980 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7981 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7982 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7983 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7984 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7985 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7986 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7987 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7988 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7989 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7990 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7991 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7992 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7993 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7994 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7995 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7996 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7997 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7998 2025-09-17 2025-09-22 7.8 - -
CVE-2025-7999 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8000 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8001 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8002 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8003 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8004 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8005 2025-09-17 2025-09-22 7.8 - -
CVE-2025-8006 2025-09-17 2025-09-22 7.8 - -
CVE-2025-11463 2025-10-29 2025-11-04 7.8 - -
CVE-2025-11464 2025-10-29 2025-11-04 7.8 - -
CVE-2025-11465 2025-10-29 2025-11-04 7.8 - -
CVE-2025-65084 2025-11-25 2025-11-28 9.8 - -
CVE-2025-65085 2025-11-25 2025-11-28 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ashlar by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ashlar's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.