Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

eyoucms

About This Vendor

eyoucms is a technology vendor producing software and infrastructure products. As a software provider, eyoucms's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of eyoucms's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 74 known vulnerabilities from eyoucms. This includes 5 critical-severity issues and 12 high-severity issues that represent significant risk. These vulnerabilities affect 1 distinct product across eyoucms's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2019 through 2025, reflecting sustained security scrutiny over multiple years. Organizations deploying eyoucms products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-17430 2019-10-10 2024-11-21 6.1 4.3 Likely
CVE-2020-18129 2020-10-22 2024-11-21 8.8 6.8 Likely
CVE-2020-21929 2021-08-10 2024-11-21 5.4 3.5 Unknown
CVE-2020-21930 2021-08-10 2024-11-21 5.4 3.5 Unknown
CVE-2020-28146 2021-08-18 2024-11-21 6.1 4.3 Likely
CVE-2020-19669 2021-08-18 2024-11-21 8.8 6.8 Likely
CVE-2020-20642 2021-08-19 2024-11-21 8.8 6.8 Likely
CVE-2020-20645 2021-08-19 2024-11-21 5.4 3.5 Unknown
CVE-2021-39496 2021-09-07 2024-11-21 5.4 3.5 Unknown
CVE-2021-39497 2021-09-07 2024-11-21 9.8 7.5 Likely
CVE-2021-39499 2021-09-07 2024-11-21 6.1 4.3 Likely
CVE-2021-39500 2021-09-07 2024-11-21 7.5 5.0 Likely
CVE-2021-39501 2021-09-07 2024-11-21 6.1 5.8 Likely
CVE-2020-24000 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-46255 2022-01-14 2024-11-21 8.1 5.5 Likely
CVE-2021-42194 2022-03-20 2024-11-21 7.2 6.5 Likely
CVE-2022-26279 2022-03-24 2024-11-21 9.8 7.5 Likely
CVE-2022-26273 2022-03-28 2024-11-21 9.8 7.5 Likely
CVE-2022-33122 2022-06-24 2024-11-21 4.8 3.5 Unknown
CVE-2022-35509 2022-08-10 2024-11-21 5.4 - -
CVE-2022-36225 2022-08-19 2024-11-21 8.8 - -
CVE-2022-41500 2022-10-18 2025-05-15 8.8 - -
CVE-2022-43323 2022-11-14 2025-04-30 8.8 - -
CVE-2022-44387 2022-11-14 2025-04-30 8.8 - -
CVE-2022-44389 2022-11-14 2025-04-30 6.5 - -
CVE-2022-44390 2022-11-14 2024-11-21 5.4 - -
CVE-2022-45280 2022-11-23 2025-04-25 5.4 - -
CVE-2021-39428 2022-12-15 2025-04-21 5.4 - -
CVE-2022-45537 2023-01-20 2025-04-03 6.1 - -
CVE-2022-45538 2023-01-20 2025-04-03 6.1 - -
CVE-2022-45539 2023-01-20 2025-04-03 6.1 - -
CVE-2022-45540 2023-01-20 2025-04-03 6.1 - -
CVE-2022-45541 2023-01-20 2025-04-03 6.1 - -
CVE-2022-45542 2023-01-20 2025-04-03 5.4 - -
CVE-2022-45755 2023-02-08 2025-03-25 5.4 - -
CVE-2023-1798 2023-04-02 2024-11-21 3.5 4.0 Likely
CVE-2023-1799 2023-04-02 2024-11-21 3.5 4.0 Likely
CVE-2023-2057 2023-04-14 2024-11-21 2.4 3.3 Unknown
CVE-2023-2058 2023-04-14 2024-11-21 2.4 3.3 Unknown
CVE-2023-30125 2023-04-28 2025-01-31 6.1 - -
CVE-2023-31708 2023-05-23 2025-01-21 4.3 - -
CVE-2023-33492 2023-06-12 2024-11-21 5.4 - -
CVE-2023-34657 2023-06-19 2024-12-12 4.8 - -
CVE-2023-36093 2023-06-22 2024-11-21 5.4 - -
CVE-2023-37132 2023-07-06 2024-11-21 5.4 - -
CVE-2023-37133 2023-07-06 2024-11-21 5.4 - -
CVE-2023-37134 2023-07-06 2024-11-21 5.4 - -
CVE-2023-37135 2023-07-06 2024-11-21 5.4 - -
CVE-2023-37136 2023-07-06 2024-11-21 5.4 - -
CVE-2023-37645 2023-07-20 2024-11-21 5.3 - -
CVE-2023-41597 2023-11-15 2024-11-21 6.1 - -
CVE-2023-46935 2023-11-21 2024-11-21 5.4 - -
CVE-2023-48880 2023-11-29 2024-11-21 4.8 - -
CVE-2023-48881 2023-11-29 2024-11-21 4.8 - -
CVE-2023-48882 2023-11-29 2024-11-21 4.8 - -
CVE-2023-50566 2023-12-14 2024-11-21 5.4 - -
CVE-2024-22927 2024-02-01 2025-05-15 6.1 - -
CVE-2024-23031 2024-02-01 2025-06-04 6.1 - -
CVE-2024-23032 2024-02-01 2025-06-20 6.1 - -
CVE-2024-23033 2024-02-01 2025-05-29 6.1 - -
CVE-2024-23034 2024-02-01 2025-05-29 6.1 - -
CVE-2023-42286 2024-03-14 2025-04-16 9.8 - -
CVE-2024-3431 2024-04-07 2025-06-05 4.7 5.8 Unknown
CVE-2024-48195 2024-10-28 2025-04-17 6.1 - -
CVE-2024-48196 2024-10-28 2025-04-18 7.5 - -
CVE-2024-11210 2024-11-14 2024-11-19 5.4 5.5 Likely
CVE-2024-11211 2024-11-14 2024-11-19 4.7 5.8 Unknown
CVE-2024-52680 2025-08-07 2025-08-14 6.1 - -
CVE-2025-52335 2025-08-14 2025-08-18 6.1 - -
CVE-2025-65868 2025-12-03 2025-12-16 7.5 - -
CVE-2025-15143 2025-12-28 2026-02-24 4.7 5.8 Unknown
CVE-2025-15373 2025-12-31 2026-01-02 6.3 6.5 Likely
CVE-2025-15374 2025-12-31 2026-02-24 3.5 4.0 Likely
CVE-2025-15375 2025-12-31 2026-02-24 6.3 6.5 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for eyoucms by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with eyoucms's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.