Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

chadhaajay

About This Vendor

chadhaajay is a technology vendor producing software and infrastructure products. As a software provider, chadhaajay's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of chadhaajay's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 119 known vulnerabilities from chadhaajay. This includes 5 high-severity issues requiring prompt remediation. These vulnerabilities affect 2 distinct products across chadhaajay's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2020 through 2020, with recent active disclosure activity. Organizations deploying chadhaajay products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-10386 2020-03-12 2024-11-21 7.2 6.5 Likely
CVE-2020-10387 2020-03-12 2024-11-21 4.9 4.0 Likely
CVE-2020-10388 2020-03-12 2024-11-21 5.4 3.5 Unknown
CVE-2020-10389 2020-03-12 2024-11-21 7.2 6.5 Likely
CVE-2020-10390 2020-03-12 2024-11-21 7.2 6.5 Likely
CVE-2020-10391 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10392 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10393 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10394 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10395 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10396 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10397 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10398 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10399 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10400 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10401 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10402 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10403 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10404 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10405 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10406 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10407 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10408 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10409 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10410 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10411 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10412 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10413 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10414 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10415 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10416 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10417 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10418 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10419 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10420 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10421 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10422 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10423 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10424 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10425 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10426 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10427 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10428 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10429 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10430 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10431 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10432 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10433 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10434 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10435 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10436 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10437 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10438 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10439 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10440 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10441 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10442 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10443 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10444 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10445 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10446 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10447 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10448 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10449 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10450 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10451 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10452 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10453 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10454 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10455 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10456 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10457 2020-03-12 2024-11-21 2.7 4.0 Likely
CVE-2020-10458 2020-03-12 2024-11-21 6.5 5.5 Likely
CVE-2020-10459 2020-03-12 2024-11-21 2.7 4.0 Likely
CVE-2020-10460 2020-03-12 2024-11-21 4.9 4.0 Likely
CVE-2020-10461 2020-03-12 2024-11-21 6.1 4.3 Likely
CVE-2020-10462 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10463 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10464 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10465 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10466 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10467 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10468 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10469 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10470 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10472 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10473 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10474 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10475 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10476 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10477 2020-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-10478 2020-03-12 2024-11-21 8.8 6.8 Likely
CVE-2020-10479 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10480 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10481 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10482 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10483 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10484 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10485 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10486 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10487 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10488 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10489 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10490 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10491 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10492 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10493 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10494 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10495 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10496 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10497 2020-03-12 2024-11-21 6.5 4.3 Likely
CVE-2020-10498 2020-03-12 2024-11-21 6.5 4.3 Likely
CVE-2020-10499 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10500 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10501 2020-03-12 2024-11-21 6.5 4.3 Likely
CVE-2020-10502 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10503 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-10504 2020-03-12 2024-11-21 4.3 4.3 Likely
CVE-2020-11579 2020-09-03 2024-11-21 7.5 5.0 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for chadhaajay by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with chadhaajay's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.