Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

portabilis

About This Vendor

portabilis is a technology vendor producing software and infrastructure products. As a software provider, portabilis's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of portabilis's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 107 known vulnerabilities from portabilis. This includes 6 high-severity issues requiring prompt remediation. These vulnerabilities affect 2 distinct products across portabilis's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2023 through 2026, with recent active disclosure activity. Organizations deploying portabilis products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-5578 2023-10-14 2025-10-02 3.5 4.0 Likely
CVE-2024-45057 2024-08-28 2024-09-13 6.1 - -
CVE-2024-45058 2024-08-28 2024-09-13 8.1 - -
CVE-2024-45059 2024-08-28 2024-09-13 8.8 - -
CVE-2024-48325 2024-11-06 2025-06-24 8.1 - -
CVE-2024-55239 2024-12-18 2025-07-03 5.4 - -
CVE-2024-12893 2024-12-22 2025-07-02 2.4 3.3 Unknown
CVE-2024-55651 2025-05-08 2025-06-17 5.4 - -
CVE-2025-7109 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7110 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7111 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7112 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7113 2025-07-07 2025-08-13 3.5 4.0 Likely
CVE-2025-7866 2025-07-20 2025-08-13 3.5 4.0 Likely
CVE-2025-7867 2025-07-20 2025-09-27 3.5 4.0 Likely
CVE-2025-7868 2025-07-20 2025-09-27 3.5 4.0 Likely
CVE-2025-7869 2025-07-20 2025-08-13 3.5 4.0 Likely
CVE-2025-7870 2025-07-20 2025-09-04 3.5 4.0 Likely
CVE-2025-7871 2025-07-20 2025-09-04 3.5 4.0 Likely
CVE-2025-7872 2025-07-20 2025-09-04 3.5 4.0 Likely
CVE-2025-8346 2025-07-31 2025-08-13 4.3 5.0 Likely
CVE-2025-8365 2025-07-31 2025-08-05 3.5 4.0 Likely
CVE-2025-8366 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8367 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8368 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8369 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8370 2025-07-31 2025-08-05 4.3 5.0 Likely
CVE-2025-8507 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8508 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8509 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8510 2025-08-03 2025-08-12 3.5 4.0 Likely
CVE-2025-8511 2025-08-03 2025-09-11 3.5 4.0 Likely
CVE-2025-8538 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8539 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8540 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8541 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8542 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8543 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8544 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8545 2025-08-05 2025-08-12 2.4 3.3 Unknown
CVE-2025-8784 2025-08-09 2025-08-12 3.5 4.0 Likely
CVE-2025-8785 2025-08-10 2025-08-12 3.5 4.0 Likely
CVE-2025-8786 2025-08-10 2025-09-02 3.5 4.0 Likely
CVE-2025-8787 2025-08-10 2025-09-02 3.5 4.0 Likely
CVE-2025-8788 2025-08-10 2025-09-02 3.5 4.0 Likely
CVE-2025-8789 2025-08-10 2025-09-25 4.3 4.0 Likely
CVE-2025-8790 2025-08-10 2025-09-25 4.3 4.0 Likely
CVE-2025-8918 2025-08-13 2025-08-14 2.4 3.3 Unknown
CVE-2025-8919 2025-08-13 2025-09-10 2.4 3.3 Unknown
CVE-2025-8920 2025-08-13 2025-09-10 2.4 3.3 Unknown
CVE-2025-9104 2025-08-18 2025-09-02 3.5 4.0 Likely
CVE-2025-9105 2025-08-18 2025-09-02 3.5 4.0 Likely
CVE-2025-9106 2025-08-18 2025-09-02 3.5 4.0 Likely
CVE-2025-9107 2025-08-18 2025-09-02 4.3 5.0 Likely
CVE-2025-9109 2025-08-18 2025-09-10 3.7 2.6 Unknown
CVE-2025-9236 2025-08-20 2025-09-04 6.3 6.5 Likely
CVE-2025-9531 2025-08-27 2025-09-04 6.3 6.5 Likely
CVE-2025-9532 2025-08-27 2025-09-04 6.3 6.5 Likely
CVE-2025-9606 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9607 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9608 2025-08-29 2025-09-02 6.3 6.5 Likely
CVE-2025-9609 2025-08-29 2025-09-04 6.3 6.5 Likely
CVE-2025-9652 2025-08-29 2025-09-04 3.5 4.0 Likely
CVE-2025-9653 2025-08-29 2025-09-04 3.5 4.0 Likely
CVE-2025-9684 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9685 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9686 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9687 2025-08-30 2025-09-04 6.3 6.5 Likely
CVE-2025-9720 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9721 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9722 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9723 2025-08-31 2025-10-13 3.5 4.0 Likely
CVE-2025-9724 2025-08-31 2025-09-03 3.5 4.0 Likely
CVE-2025-9738 2025-08-31 2025-09-27 3.5 4.0 Likely
CVE-2025-9760 2025-09-01 2025-09-27 6.3 6.5 Likely
CVE-2025-10011 2025-09-05 2025-09-26 6.3 6.5 Likely
CVE-2025-10012 2025-09-05 2025-09-08 6.3 6.5 Likely
CVE-2025-10013 2025-09-05 2025-09-08 6.3 6.5 Likely
CVE-2025-10070 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10071 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10072 2025-09-07 2025-09-09 6.3 6.5 Likely
CVE-2025-10073 2025-09-08 2025-09-09 4.3 4.0 Likely
CVE-2025-10074 2025-09-08 2025-09-09 3.5 4.0 Likely
CVE-2025-10099 2025-09-08 2025-09-11 2.4 3.3 Unknown
CVE-2025-10372 2025-09-13 2025-10-28 3.5 4.0 Likely
CVE-2025-10373 2025-09-13 2025-10-20 3.5 4.0 Likely
CVE-2025-10584 2025-09-17 2025-10-20 3.5 4.0 Likely
CVE-2025-10590 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10591 2025-09-17 2025-09-18 3.5 4.0 Likely
CVE-2025-10605 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10606 2025-09-17 2025-09-18 4.3 5.0 Likely
CVE-2025-10607 2025-09-17 2025-09-18 4.3 4.0 Likely
CVE-2025-10608 2025-09-17 2025-09-18 6.3 6.5 Likely
CVE-2025-10844 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-10845 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-10846 2025-09-23 2025-10-28 6.3 6.5 Likely
CVE-2025-11047 2025-09-26 2025-10-07 6.3 6.5 Likely
CVE-2025-11048 2025-09-26 2025-10-07 6.3 6.5 Likely
CVE-2025-11049 2025-09-27 2025-10-03 6.3 6.5 Likely
CVE-2025-11050 2025-09-27 2025-10-03 6.3 6.5 Likely
CVE-2025-11554 2025-10-09 2025-11-21 6.3 6.5 Likely
CVE-2025-65022 2025-11-19 2025-11-20 7.2 - -
CVE-2025-65023 2025-11-19 2025-11-20 7.2 - -
CVE-2025-65024 2025-11-19 2025-11-20 7.2 - -
CVE-2025-9638 2025-12-09 2025-12-11 4.8 - -
CVE-2026-2015 2026-02-06 2026-02-10 6.3 6.5 Likely
CVE-2026-2064 2026-02-06 2026-02-11 3.5 4.0 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for portabilis by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with portabilis's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.