Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

avast

About This Vendor

avast is a technology vendor producing software and infrastructure products. As a software provider, avast's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of avast's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 75 known vulnerabilities from avast. This includes 5 critical-severity issues and 43 high-severity issues that represent significant risk. These vulnerabilities affect 52 distinct products across avast's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2007 through 2025, indicating decades of continuous security attention and research. Organizations deploying avast products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-1672 2007-05-09 2025-04-09 - 7.8 Likely
CVE-2007-1673 2007-05-09 2025-04-09 - 7.8 Likely
CVE-2007-2845 2007-05-24 2025-04-09 - 9.3 Likely
CVE-2007-6265 2007-12-07 2025-04-09 - 6.8 Likely
CVE-2008-1625 2008-04-02 2025-04-09 - 6.8 Unknown
CVE-2008-5523 2008-12-12 2025-04-09 - 9.3 Likely
CVE-2008-6846 2009-07-02 2025-04-09 - 6.8 Likely
CVE-2009-3522 2009-10-01 2025-04-09 - 7.2 Unknown
CVE-2009-3523 2009-10-01 2025-04-09 - 6.9 Unknown
CVE-2009-3524 2009-10-01 2025-04-09 - 7.2 Unknown
CVE-2009-4049 2009-11-23 2025-04-09 - 7.2 Unknown
CVE-2010-0705 2010-02-25 2025-04-11 - 7.2 Unknown
CVE-2010-3126 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2013-0122 2013-04-22 2025-04-11 - 1.9 Unknown
CVE-2015-5662 2015-10-18 2025-04-12 - 6.4 Likely
CVE-2016-3986 2016-04-12 2025-04-12 7.8 9.3 Likely
CVE-2015-8620 2016-04-13 2025-04-12 7.8 7.2 Unknown
CVE-2016-4025 2016-11-03 2025-04-12 5.5 2.1 Unknown
CVE-2017-5567 2017-03-21 2025-04-20 6.7 7.2 Unknown
CVE-2017-8307 2017-04-27 2025-04-20 9.8 7.5 Likely
CVE-2017-8308 2017-04-27 2025-04-20 7.5 5.0 Likely
CVE-2018-12572 2019-03-21 2024-11-21 7.8 2.1 Unknown
CVE-2019-11230 2019-07-18 2024-11-21 4.4 3.6 Unknown
CVE-2019-17093 2019-10-23 2024-11-21 7.8 4.4 Unknown
CVE-2019-18653 2019-11-01 2024-11-21 6.1 4.3 Likely
CVE-2019-18893 2020-01-13 2024-11-21 6.1 4.3 Likely
CVE-2019-18894 2020-01-13 2024-11-21 7.8 9.3 Likely
CVE-2019-17190 2020-01-27 2024-11-21 7.8 7.2 Unknown
CVE-2020-9399 2020-02-28 2024-11-21 5.5 4.3 Likely
CVE-2020-8987 2020-03-09 2024-11-21 7.4 5.8 Likely
CVE-2020-10860 2020-04-01 2024-11-21 7.5 5.0 Likely
CVE-2020-10861 2020-04-01 2024-11-21 7.5 6.4 Likely
CVE-2020-10862 2020-04-01 2024-11-21 7.8 4.6 Unknown
CVE-2020-10863 2020-04-01 2024-11-21 7.5 5.0 Likely
CVE-2020-10864 2020-04-01 2024-11-21 6.5 5.0 Likely
CVE-2020-10865 2020-04-01 2024-11-21 7.5 5.0 Likely
CVE-2020-10866 2020-04-01 2024-11-21 7.5 5.0 Likely
CVE-2020-10867 2020-04-01 2024-11-21 9.8 7.5 Likely
CVE-2020-10868 2020-04-01 2024-11-21 7.5 5.0 Likely
CVE-2020-13657 2020-06-29 2024-11-21 5.5 2.1 Unknown
CVE-2020-15024 2020-09-10 2024-11-21 5.5 2.1 Unknown
CVE-2020-25289 2020-09-13 2024-11-21 5.5 2.1 Unknown
CVE-2021-27241 2021-03-29 2024-11-21 6.1 3.6 Unknown
CVE-2020-23907 2021-04-21 2024-11-21 9.8 7.5 Likely
CVE-2021-45335 2021-12-27 2024-11-21 8.8 7.2 Unknown
CVE-2021-45336 2021-12-27 2024-11-21 8.8 7.2 Unknown
CVE-2021-45337 2021-12-27 2024-11-21 8.8 7.2 Unknown
CVE-2021-45338 2021-12-27 2024-11-21 7.8 7.2 Unknown
CVE-2021-45339 2021-12-27 2024-11-21 7.8 7.2 Unknown
CVE-2022-28964 2022-05-20 2024-11-21 7.1 5.4 Unknown
CVE-2022-28965 2022-05-20 2024-11-21 6.5 4.4 Unknown
CVE-2022-4173 2022-12-06 2024-11-21 7.3 - -
CVE-2022-4291 2022-12-08 2024-11-21 7.7 - -
CVE-2022-4294 2023-01-10 2024-11-21 7.1 - -
CVE-2023-1585 2023-04-19 2024-11-21 6.5 - -
CVE-2023-1586 2023-04-19 2024-11-21 6.5 - -
CVE-2023-1587 2023-04-19 2024-11-21 5.8 - -
CVE-2020-20118 2023-07-11 2024-11-21 5.5 - -
CVE-2023-5760 2023-11-08 2024-11-21 8.2 - -
CVE-2023-42124 2024-05-03 2025-08-13 7.8 - -
CVE-2023-42125 2024-05-03 2025-08-13 7.8 - -
CVE-2024-5102 2024-06-10 2024-11-21 7.0 - -
CVE-2024-9481 2024-10-04 2024-11-08 5.1 - -
CVE-2024-9482 2024-10-04 2024-11-08 5.1 - -
CVE-2024-9483 2024-10-04 2024-11-08 5.1 - -
CVE-2024-9484 2024-10-04 2024-11-08 5.1 - -
CVE-2024-7227 2024-11-22 2024-12-09 7.8 - -
CVE-2024-7228 2024-11-22 2024-12-09 5.5 - -
CVE-2024-7229 2024-11-22 2024-12-09 7.8 - -
CVE-2024-7230 2024-11-22 2024-12-09 7.8 - -
CVE-2024-7231 2024-11-22 2024-12-09 7.8 - -
CVE-2024-7232 2024-11-22 2024-12-11 7.8 - -
CVE-2024-7233 2024-11-22 2025-01-08 7.8 - -
CVE-2025-13032 2025-11-11 2025-12-08 9.9 - -
CVE-2025-3500 2025-12-01 2026-02-06 9.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for avast by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with avast's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.