Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

sem-cms

About This Vendor

sem-cms is a technology vendor producing software and infrastructure products. As a software provider, sem-cms's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of sem-cms's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 59 known vulnerabilities from sem-cms. This includes 20 critical-severity issues and 10 high-severity issues that represent significant risk. These vulnerabilities affect 1 distinct product across sem-cms's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying sem-cms products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-18738 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18739 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18740 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18741 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18742 2018-10-29 2024-11-21 8.8 6.8 Likely
CVE-2018-18743 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18744 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18745 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18783 2018-10-29 2024-11-21 6.1 4.3 Likely
CVE-2018-18840 2018-10-30 2024-11-21 5.4 3.5 Unknown
CVE-2018-18841 2018-10-30 2024-11-21 4.8 3.5 Unknown
CVE-2018-20017 2018-12-10 2024-11-21 4.8 3.5 Unknown
CVE-2019-11518 2019-04-25 2024-11-21 7.2 6.5 Likely
CVE-2020-18078 2021-12-17 2024-11-21 9.8 5.0 Likely
CVE-2020-18081 2021-12-17 2024-11-21 7.5 5.0 Likely
CVE-2022-2726 2022-08-09 2024-11-21 6.3 - -
CVE-2021-38734 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38736 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38737 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38217 2022-10-28 2025-05-08 9.8 - -
CVE-2021-38728 2022-10-28 2025-05-07 6.1 - -
CVE-2021-38729 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38730 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38731 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38732 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38733 2022-10-28 2025-05-07 9.8 - -
CVE-2023-30090 2023-05-05 2025-01-29 9.8 - -
CVE-2023-31707 2023-05-19 2025-01-21 9.8 - -
CVE-2020-18432 2023-06-30 2024-11-21 9.8 - -
CVE-2023-37647 2023-07-31 2024-11-21 9.8 - -
CVE-2020-23564 2023-08-05 2024-11-21 7.2 - -
CVE-2023-48863 2023-12-04 2025-06-03 7.5 - -
CVE-2023-50563 2023-12-14 2024-11-21 9.8 - -
CVE-2023-48864 2024-01-10 2025-06-20 7.5 - -
CVE-2024-25422 2024-02-28 2025-03-29 9.8 - -
CVE-2024-28405 2024-03-29 2025-04-04 7.2 - -
CVE-2024-31009 2024-04-03 2025-04-04 6.5 - -
CVE-2024-31010 2024-04-03 2025-04-04 7.5 - -
CVE-2024-31012 2024-04-03 2025-04-04 9.8 - -
CVE-2024-30938 2024-04-19 2025-04-04 9.8 - -
CVE-2024-32409 2024-04-19 2025-04-04 7.1 - -
CVE-2024-4595 2024-05-07 2025-04-04 6.3 6.5 Likely
CVE-2024-36800 2024-06-04 2025-04-03 7.5 - -
CVE-2024-36801 2024-06-04 2025-04-03 5.9 - -
CVE-2024-46103 2024-09-20 2025-04-04 9.8 - -
CVE-2024-52725 2024-11-20 2025-04-04 4.9 - -
CVE-2024-53502 2024-12-03 2025-04-04 3.8 - -
CVE-2024-13193 2025-01-08 2025-04-04 6.3 6.5 Likely
CVE-2025-25686 2025-03-27 2025-04-11 9.8 - -
CVE-2025-51652 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51653 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51654 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51655 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51656 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51657 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51658 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51659 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51660 2025-07-14 2025-07-15 5.4 - -
CVE-2026-1552 2026-01-29 2026-02-09 6.3 6.5 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for sem-cms by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with sem-cms's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.