Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

hasthemes

About This Vendor

hasthemes is a technology vendor producing software and infrastructure products. As a software provider, hasthemes's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of hasthemes's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 96 known vulnerabilities from hasthemes. This includes 6 critical-severity issues and 7 high-severity issues that represent significant risk. These vulnerabilities affect 33 distinct products across hasthemes's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2021 through 2025, with recent active disclosure activity. Organizations deploying hasthemes products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-24261 2021-05-05 2024-11-21 5.4 3.5 Unknown
CVE-2021-24262 2021-05-05 2024-11-21 5.4 3.5 Unknown
CVE-2022-4650 2023-01-23 2025-04-03 5.4 - -
CVE-2023-23899 2023-02-17 2024-11-21 4.3 - -
CVE-2023-0231 2023-02-21 2025-03-12 5.4 - -
CVE-2023-0232 2023-02-21 2025-03-12 9.8 - -
CVE-2022-46798 2023-03-01 2024-11-21 5.4 - -
CVE-2023-0484 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0495 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0496 2023-03-27 2025-02-14 4.3 - -
CVE-2023-0497 2023-03-27 2025-02-26 4.3 - -
CVE-2023-0498 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0499 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0500 2023-03-27 2025-02-19 6.5 - -
CVE-2023-0501 2023-03-27 2025-02-19 6.5 - -
CVE-2023-0502 2023-03-27 2025-02-19 6.5 - -
CVE-2023-0503 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0504 2023-03-27 2025-02-19 4.3 - -
CVE-2023-0505 2023-03-27 2025-02-19 4.3 - -
CVE-2023-1086 2023-03-27 2025-02-19 4.3 - -
CVE-2023-1087 2023-03-27 2025-02-19 4.3 - -
CVE-2023-1088 2023-03-27 2025-02-19 4.3 - -
CVE-2023-1089 2023-03-27 2025-02-19 4.3 - -
CVE-2023-23801 2023-04-06 2024-11-21 4.3 - -
CVE-2023-23802 2023-06-15 2024-11-21 4.3 - -
CVE-2023-23804 2023-07-10 2024-11-21 4.3 - -
CVE-2023-23792 2023-07-11 2024-11-21 4.3 - -
CVE-2023-23791 2023-07-11 2024-11-21 4.3 - -
CVE-2023-23803 2023-07-11 2024-11-21 4.3 - -
CVE-2023-23731 2023-07-11 2024-11-21 4.3 - -
CVE-2022-47172 2023-07-17 2024-11-21 4.3 - -
CVE-2023-32962 2023-08-30 2024-11-21 5.9 - -
CVE-2023-50901 2023-12-29 2024-11-21 7.1 - -
CVE-2023-51372 2023-12-29 2024-11-21 5.9 - -
CVE-2023-51529 2024-02-29 2025-01-22 4.3 - -
CVE-2024-1397 2024-03-12 2026-04-08 6.4 - -
CVE-2024-1421 2024-03-12 2026-04-08 6.4 - -
CVE-2024-1176 2024-03-13 2026-04-08 5.3 - -
CVE-2024-29102 2024-03-19 2026-01-28 7.1 - -
CVE-2024-29094 2024-03-19 2026-01-28 7.1 - -
CVE-2024-29926 2024-03-27 2026-01-28 6.5 - -
CVE-2024-29927 2024-03-27 2026-01-28 6.5 - -
CVE-2024-30182 2024-03-27 2026-04-01 5.4 - -
CVE-2024-2868 2024-04-04 2026-04-08 6.4 - -
CVE-2024-1960 2024-04-09 2026-04-08 6.4 - -
CVE-2024-1974 2024-04-09 2026-04-08 8.8 - -
CVE-2024-2946 2024-04-09 2026-04-08 6.4 - -
CVE-2024-1057 2024-04-20 2026-04-08 6.4 - -
CVE-2024-32782 2024-04-24 2026-04-01 6.5 - -
CVE-2023-6214 2024-05-02 2026-04-08 7.5 - -
CVE-2023-7067 2024-05-02 2026-04-08 4.3 - -
CVE-2024-2084 2024-05-02 2026-04-08 6.4 - -
CVE-2024-2085 2024-05-02 2026-04-08 6.4 - -
CVE-2024-2790 2024-05-02 2026-04-08 6.4 - -
CVE-2024-3307 2024-05-02 2026-04-08 6.4 - -
CVE-2024-3308 2024-05-02 2026-04-08 6.4 - -
CVE-2024-3991 2024-05-02 2026-04-08 6.4 - -
CVE-2023-6327 2024-05-14 2026-04-08 5.3 - -
CVE-2024-3989 2024-05-14 2026-04-08 6.4 - -
CVE-2024-3990 2024-05-14 2026-04-08 6.4 - -
CVE-2023-37999 2024-05-17 2025-01-29 9.8 - -
CVE-2024-3345 2024-05-21 2026-04-08 6.4 - -
CVE-2024-4566 2024-05-21 2026-04-08 7.1 - -
CVE-2024-4875 2024-05-21 2026-04-08 4.3 - -
CVE-2024-4876 2024-05-21 2026-04-08 6.4 - -
CVE-2024-34767 2024-06-03 2025-11-25 6.5 - -
CVE-2024-35699 2024-06-08 2024-11-21 6.5 - -
CVE-2024-5530 2024-06-11 2026-04-08 6.4 - -
CVE-2024-5173 2024-06-26 2026-04-08 6.4 - -
CVE-2024-5215 2024-06-26 2026-04-08 6.4 - -
CVE-2024-38706 2024-07-12 2026-04-01 8.8 - -
CVE-2024-8668 2024-09-25 2024-10-07 6.4 - -
CVE-2024-8910 2024-09-25 2024-10-03 4.3 - -
CVE-2024-9538 2024-10-11 2025-11-25 4.3 - -
CVE-2024-49630 2024-10-20 2026-04-01 5.4 - -
CVE-2024-51682 2024-11-04 2026-04-01 5.4 - -
CVE-2024-51673 2024-11-09 2026-04-01 5.4 - -
CVE-2025-24695 2025-01-24 2026-04-01 - - -
CVE-2024-12597 2025-02-04 2025-02-05 6.4 - -
CVE-2024-12599 2025-02-11 2026-04-08 6.4 - -
CVE-2025-26917 2025-03-03 2026-04-01 6.1 - -
CVE-2025-1261 2025-03-08 2025-03-24 6.4 - -
CVE-2025-1527 2025-03-12 2025-03-24 6.4 - -
CVE-2025-1802 2025-03-20 2025-03-26 6.4 - -
CVE-2025-3775 2025-04-25 2025-11-26 6.5 - -
CVE-2025-7340 2025-07-15 2026-04-08 9.8 - -
CVE-2025-7341 2025-07-15 2026-04-08 9.1 - -
CVE-2025-7360 2025-07-15 2026-04-08 9.1 - -
CVE-2025-8068 2025-07-31 2025-08-13 4.3 - -
CVE-2025-8151 2025-07-31 2025-08-13 4.3 - -
CVE-2025-8401 2025-07-31 2025-08-13 4.3 - -
CVE-2025-58990 2025-09-09 2026-04-01 5.4 - -
CVE-2025-11823 2025-10-25 2025-11-26 6.4 - -
CVE-2025-12493 2025-11-04 2025-11-26 9.8 - -
CVE-2025-64271 2025-11-13 2026-02-13 6.5 - -
CVE-2025-68533 2025-12-24 2026-01-29 5.4 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for hasthemes by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with hasthemes's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.