Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ptc

About This Vendor

ptc is a technology vendor producing software and infrastructure products. As a software provider, ptc's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ptc's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 34 known vulnerabilities from ptc. This includes 11 critical-severity issues and 9 high-severity issues that represent significant risk. These vulnerabilities affect 23 distinct products across ptc's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2007 through 2024, indicating decades of continuous security attention and research. Organizations deploying ptc products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-4600 2007-10-18 2025-04-09 - 4.6 Unknown
CVE-2014-9267 2014-12-08 2025-04-12 - 6.8 Likely
CVE-2015-2061 2015-03-09 2025-04-12 - 7.5 Likely
CVE-2018-17216 2018-10-01 2024-11-21 6.5 4.0 Likely
CVE-2018-17217 2018-10-01 2024-11-21 7.5 5.0 Likely
CVE-2018-17218 2018-10-01 2024-11-21 5.4 3.5 Unknown
CVE-2018-20092 2018-12-17 2024-11-21 7.5 5.0 Likely
CVE-2020-27263 2021-01-14 2024-11-21 9.1 6.4 Likely
CVE-2020-27265 2021-01-14 2024-11-21 9.8 7.5 Likely
CVE-2020-27267 2021-01-14 2024-11-21 9.1 6.4 Likely
CVE-2022-25246 2022-03-16 2024-11-21 9.8 9.0 Likely
CVE-2022-25247 2022-03-16 2024-11-21 9.8 10.0 Likely
CVE-2022-25248 2022-03-16 2024-11-21 5.3 5.0 Likely
CVE-2022-25249 2022-03-16 2024-11-21 7.5 5.0 Likely
CVE-2022-25250 2022-03-16 2024-11-21 7.5 5.0 Likely
CVE-2022-25251 2022-03-16 2024-11-21 9.8 7.5 Likely
CVE-2022-25252 2022-03-16 2024-11-21 7.5 5.0 Likely
CVE-2023-0754 2023-02-23 2024-11-21 9.8 - -
CVE-2023-0755 2023-02-23 2024-11-21 9.8 - -
CVE-2022-2825 2023-03-29 2025-02-18 9.8 - -
CVE-2022-2848 2023-03-29 2025-02-18 9.1 - -
CVE-2023-24476 2023-06-07 2024-11-21 1.8 - -
CVE-2023-27881 2023-06-07 2024-11-21 8.0 - -
CVE-2023-29152 2023-06-07 2024-11-21 6.2 - -
CVE-2023-29168 2023-06-07 2024-11-21 3.7 - -
CVE-2023-29502 2023-06-07 2024-11-21 6.2 - -
CVE-2023-31200 2023-06-07 2024-11-21 5.7 - -
CVE-2023-5908 2023-11-30 2024-11-21 9.1 - -
CVE-2023-5909 2023-11-30 2024-11-21 7.5 - -
CVE-2023-29444 2024-01-10 2024-11-21 6.3 - -
CVE-2023-29445 2024-01-10 2024-11-21 7.8 - -
CVE-2023-29446 2024-01-10 2024-11-21 4.7 - -
CVE-2023-29447 2024-01-10 2024-11-21 5.7 - -
CVE-2024-40395 2024-08-27 2025-03-25 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ptc by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ptc's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.