Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

openatom

About This Vendor

openatom is a technology vendor producing software and infrastructure products. As a software provider, openatom's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of openatom's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 166 known vulnerabilities from openatom. This includes 1 critical-severity issue and 32 high-severity issues that represent significant risk. These vulnerabilities affect 8 distinct products across openatom's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2022 through 2026, with recent active disclosure activity. Organizations deploying openatom products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-33658 2022-03-11 2025-04-02 7.8 4.6 Unknown
CVE-2021-33656 2022-07-18 2025-04-02 6.8 - -
CVE-2021-33643 2022-08-10 2025-11-03 9.1 - -
CVE-2021-33644 2022-08-10 2025-11-03 8.1 - -
CVE-2021-33645 2022-08-10 2025-11-03 7.5 - -
CVE-2021-33646 2022-08-10 2025-11-03 7.5 - -
CVE-2022-36423 2022-09-09 2024-11-21 7.4 - -
CVE-2022-38701 2022-09-09 2024-11-21 6.2 - -
CVE-2022-41686 2022-10-14 2024-11-21 5.1 - -
CVE-2022-41802 2022-12-08 2024-11-21 4.0 - -
CVE-2022-44455 2022-12-08 2024-11-21 6.8 - -
CVE-2021-33640 2022-12-19 2025-04-02 6.2 - -
CVE-2022-43662 2023-01-09 2024-11-21 4.0 - -
CVE-2022-45126 2023-01-09 2024-11-21 4.0 - -
CVE-2023-0035 2023-01-09 2024-11-21 6.5 - -
CVE-2023-0036 2023-01-09 2024-11-21 6.5 - -
CVE-2021-33639 2023-03-08 2025-03-04 7.5 - -
CVE-2023-0083 2023-03-10 2024-11-21 4.0 - -
CVE-2023-22301 2023-03-10 2024-11-21 6.5 - -
CVE-2023-22436 2023-03-10 2024-11-21 7.8 - -
CVE-2023-24465 2023-03-10 2024-11-21 5.5 - -
CVE-2023-25947 2023-03-10 2024-11-21 6.2 - -
CVE-2023-4753 2023-09-21 2024-11-21 3.9 - -
CVE-2023-3116 2023-11-20 2024-11-21 7.3 - -
CVE-2023-42774 2023-11-20 2024-11-21 6.2 - -
CVE-2023-43612 2023-11-20 2024-11-21 8.4 - -
CVE-2023-46100 2023-11-20 2024-11-21 6.2 - -
CVE-2023-46705 2023-11-20 2024-11-21 6.2 - -
CVE-2023-47217 2023-11-20 2024-11-21 4.0 - -
CVE-2023-6045 2023-11-20 2024-11-21 5.9 - -
CVE-2023-47216 2024-01-02 2024-11-21 2.9 - -
CVE-2023-47857 2024-01-02 2024-11-21 4.0 - -
CVE-2023-48360 2024-01-02 2024-11-21 4.0 - -
CVE-2023-49135 2024-01-02 2024-11-21 4.0 - -
CVE-2023-49142 2024-01-02 2024-11-21 4.0 - -
CVE-2021-33630 2024-01-18 2025-04-02 5.5 - -
CVE-2021-33631 2024-01-18 2025-04-02 5.5 - -
CVE-2023-43756 2024-02-02 2024-11-21 2.9 - -
CVE-2023-45734 2024-02-02 2024-11-21 4.2 - -
CVE-2023-49118 2024-02-02 2024-11-21 2.9 - -
CVE-2024-0285 2024-02-02 2024-11-21 4.7 - -
CVE-2024-21845 2024-02-02 2024-11-21 2.9 - -
CVE-2024-21851 2024-02-02 2024-11-21 2.9 - -
CVE-2024-21860 2024-02-02 2024-11-21 8.2 - -
CVE-2024-21863 2024-02-02 2024-11-21 4.7 - -
CVE-2023-25176 2024-03-04 2024-12-16 2.9 - -
CVE-2023-46708 2024-03-04 2024-12-16 4.3 - -
CVE-2023-49602 2024-03-04 2024-12-16 2.9 - -
CVE-2024-21816 2024-03-04 2024-12-16 4.0 - -
CVE-2024-21826 2024-03-04 2024-12-16 4.3 - -
CVE-2024-21834 2024-04-02 2025-01-02 3.3 - -
CVE-2024-22092 2024-04-02 2025-01-27 7.7 - -
CVE-2024-22098 2024-04-02 2025-01-02 6.5 - -
CVE-2024-22177 2024-04-02 2025-01-02 3.3 - -
CVE-2024-22180 2024-04-02 2025-01-27 3.3 - -
CVE-2024-24581 2024-04-02 2025-01-27 6.5 - -
CVE-2024-28226 2024-04-02 2025-01-27 8.1 - -
CVE-2024-28951 2024-04-02 2025-01-24 5.5 - -
CVE-2024-29074 2024-04-02 2025-01-02 6.5 - -
CVE-2024-29086 2024-04-02 2025-01-02 3.3 - -
CVE-2024-23808 2024-05-07 2025-01-02 5.2 - -
CVE-2024-27217 2024-05-07 2025-01-02 6.5 - -
CVE-2024-31078 2024-05-07 2025-01-02 3.3 - -
CVE-2024-3757 2024-05-07 2025-01-02 3.3 - -
CVE-2024-3758 2024-05-07 2025-01-02 6.5 - -
CVE-2024-3759 2024-05-07 2025-01-02 6.5 - -
CVE-2024-31071 2024-07-02 2024-11-21 3.3 - -
CVE-2024-36243 2024-07-02 2024-11-21 8.2 - -
CVE-2024-36260 2024-07-02 2024-11-21 8.2 - -
CVE-2024-36278 2024-07-02 2024-11-21 3.3 - -
CVE-2024-37030 2024-07-02 2024-11-21 8.2 - -
CVE-2024-37077 2024-07-02 2024-11-21 8.2 - -
CVE-2024-37185 2024-07-02 2024-11-21 8.2 - -
CVE-2024-28044 2024-09-02 2024-09-04 3.3 - -
CVE-2024-38382 2024-09-02 2024-09-04 5.5 - -
CVE-2024-38386 2024-09-02 2024-09-04 8.4 - -
CVE-2024-39612 2024-09-02 2024-09-04 5.5 - -
CVE-2024-39775 2024-09-02 2024-09-04 6.5 - -
CVE-2024-39816 2024-09-02 2024-09-04 8.4 - -
CVE-2024-41157 2024-09-02 2024-09-04 8.8 - -
CVE-2024-41160 2024-09-02 2024-09-09 8.8 - -
CVE-2024-39806 2024-10-08 2024-10-16 5.5 - -
CVE-2024-39831 2024-10-08 2024-10-16 4.4 - -
CVE-2024-43696 2024-10-08 2024-10-16 3.3 - -
CVE-2024-43697 2024-10-08 2024-10-16 3.3 - -
CVE-2024-45382 2024-10-08 2024-10-16 3.3 - -
CVE-2024-47137 2024-11-05 2024-11-06 8.4 - -
CVE-2024-47402 2024-11-05 2024-11-06 3.3 - -
CVE-2024-47404 2024-11-05 2024-11-06 8.4 - -
CVE-2024-47797 2024-11-05 2024-11-06 8.4 - -
CVE-2024-10074 2024-12-03 2024-12-11 8.8 - -
CVE-2024-12082 2024-12-03 2024-12-11 5.5 - -
CVE-2024-9978 2024-12-03 2024-12-11 5.5 - -
CVE-2024-45070 2025-01-07 2025-10-16 5.5 - -
CVE-2024-47398 2025-01-07 2025-10-16 8.8 - -
CVE-2024-54030 2025-01-07 2025-10-16 4.4 - -
CVE-2025-0302 2025-02-07 2025-02-11 5.5 - -
CVE-2025-0303 2025-02-07 2025-02-11 8.8 - -
CVE-2025-0304 2025-02-07 2025-02-11 8.8 - -
CVE-2025-0587 2025-03-04 2025-03-11 3.8 - -
CVE-2025-20011 2025-03-04 2025-03-04 3.3 - -
CVE-2025-20021 2025-03-04 2025-03-04 3.3 - -
CVE-2025-20024 2025-03-04 2025-03-04 3.8 - -
CVE-2025-20042 2025-03-04 2025-03-04 5.5 - -
CVE-2025-20081 2025-03-04 2025-03-04 3.8 - -
CVE-2025-20091 2025-03-04 2025-03-06 3.8 - -
CVE-2025-20626 2025-03-04 2025-03-04 3.8 - -
CVE-2025-21084 2025-03-04 2025-03-04 3.8 - -
CVE-2025-21089 2025-03-04 2025-03-06 3.3 - -
CVE-2025-21097 2025-03-04 2025-03-06 3.3 - -
CVE-2025-21098 2025-03-04 2025-03-06 5.5 - -
CVE-2025-22443 2025-03-04 2025-03-06 3.3 - -
CVE-2025-22835 2025-03-04 2025-03-06 3.8 - -
CVE-2025-22837 2025-03-04 2025-03-04 3.3 - -
CVE-2025-22841 2025-03-04 2025-03-04 3.3 - -
CVE-2025-22847 2025-03-04 2025-03-04 3.3 - -
CVE-2025-22897 2025-03-04 2025-03-04 3.3 - -
CVE-2025-23234 2025-03-04 2025-03-04 3.3 - -
CVE-2025-23240 2025-03-04 2025-03-04 3.8 - -
CVE-2025-23409 2025-03-04 2025-03-04 3.8 - -
CVE-2025-23414 2025-03-04 2025-03-04 3.8 - -
CVE-2025-23418 2025-03-04 2025-03-04 3.3 - -
CVE-2025-23420 2025-03-04 2025-03-04 3.8 - -
CVE-2025-24301 2025-03-04 2025-03-04 3.8 - -
CVE-2025-24309 2025-03-04 2025-03-04 3.8 - -
CVE-2025-20102 2025-04-07 2025-10-16 3.3 - -
CVE-2025-22452 2025-04-07 2025-10-16 3.3 - -
CVE-2025-22842 2025-04-07 2025-10-16 3.3 - -
CVE-2025-22851 2025-04-07 2025-10-16 6.5 - -
CVE-2025-24304 2025-04-07 2025-10-16 3.3 - -
CVE-2025-25057 2025-04-07 2025-10-16 3.3 - -
CVE-2025-27534 2025-04-07 2025-10-16 3.3 - -
CVE-2025-22886 2025-05-06 2025-05-09 3.3 - -
CVE-2025-25052 2025-05-06 2025-05-09 3.3 - -
CVE-2025-25218 2025-05-06 2025-05-09 3.3 - -
CVE-2025-27132 2025-05-06 2025-05-09 3.8 - -
CVE-2025-27241 2025-05-06 2025-05-09 3.3 - -
CVE-2025-27248 2025-05-06 2025-05-09 3.3 - -
CVE-2025-20063 2025-06-08 2025-06-09 3.3 - -
CVE-2025-21082 2025-06-08 2025-06-09 3.3 - -
CVE-2025-23235 2025-06-08 2025-06-09 3.3 - -
CVE-2025-24493 2025-06-08 2025-06-09 5.5 - -
CVE-2025-25217 2025-06-08 2025-06-09 3.3 - -
CVE-2025-26691 2025-06-08 2025-06-09 5.5 - -
CVE-2025-26693 2025-06-08 2025-06-09 3.3 - -
CVE-2025-27131 2025-06-08 2025-06-09 6.1 - -
CVE-2025-27242 2025-06-08 2025-06-09 3.3 - -
CVE-2025-27247 2025-06-08 2025-06-09 5.5 - -
CVE-2025-27563 2025-06-08 2025-06-09 3.3 - -
CVE-2025-24298 2025-08-11 2025-08-12 8.4 - -
CVE-2025-24844 2025-08-11 2025-08-12 3.3 - -
CVE-2025-24925 2025-08-11 2025-08-12 3.3 - -
CVE-2025-25212 2025-08-11 2025-08-12 3.3 - -
CVE-2025-25278 2025-08-11 2025-08-12 8.4 - -
CVE-2025-26690 2025-08-11 2025-08-12 3.3 - -
CVE-2025-27128 2025-08-11 2025-08-12 8.4 - -
CVE-2025-27536 2025-08-11 2025-08-12 3.3 - -
CVE-2025-27562 2025-08-11 2025-08-12 3.3 - -
CVE-2025-27577 2025-08-11 2025-08-12 8.4 - -
CVE-2025-12736 2026-03-16 2026-03-17 6.5 - -
CVE-2025-25277 2026-03-16 2026-03-17 6.3 - -
CVE-2025-26474 2026-03-16 2026-03-17 3.3 - -
CVE-2025-41432 2026-03-16 2026-03-17 5.5 - -
CVE-2025-52458 2026-03-16 2026-03-17 5.5 - -
CVE-2025-6969 2026-03-16 2026-03-17 5.0 - -
CVE-2026-0639 2026-03-16 2026-03-17 3.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for openatom by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with openatom's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.