Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

themeum

About This Vendor

themeum is a technology vendor producing software and infrastructure products. As a software provider, themeum's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of themeum's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 80 known vulnerabilities from themeum. This includes 3 critical-severity issues and 18 high-severity issues that represent significant risk. These vulnerabilities affect 7 distinct products across themeum's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2020 through 2025, reflecting sustained security scrutiny over multiple years. Organizations deploying themeum products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-8615 2020-02-04 2024-11-21 6.5 2.6 Unknown
CVE-2021-24181 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24182 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24183 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24184 2021-04-05 2024-11-21 8.8 6.5 Likely
CVE-2021-24185 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24186 2021-04-05 2024-11-21 6.5 4.0 Likely
CVE-2021-24207 2021-04-05 2024-11-21 4.3 4.0 Likely
CVE-2021-24208 2021-04-05 2024-11-21 5.4 3.5 Unknown
CVE-2021-24242 2021-04-22 2024-11-21 3.8 5.5 Likely
CVE-2021-24455 2021-08-02 2024-11-21 5.4 3.5 Unknown
CVE-2021-24740 2021-10-18 2024-11-21 4.8 3.5 Unknown
CVE-2021-24873 2021-11-23 2024-11-21 6.1 4.3 Likely
CVE-2021-25013 2022-01-24 2024-11-21 6.5 4.0 Likely
CVE-2021-25017 2022-01-24 2024-11-21 6.1 4.3 Likely
CVE-2022-2563 2022-10-17 2025-05-13 4.8 - -
CVE-2022-40963 2022-11-18 2024-11-21 4.8 - -
CVE-2022-3830 2022-12-05 2025-04-24 4.8 - -
CVE-2023-0236 2023-02-06 2025-03-25 6.1 - -
CVE-2023-3133 2023-07-04 2024-11-21 7.5 - -
CVE-2021-24916 2023-08-07 2024-11-21 7.5 - -
CVE-2023-4805 2023-10-16 2025-04-23 5.4 - -
CVE-2023-25700 2023-11-03 2024-11-21 9.8 - -
CVE-2023-25800 2023-11-03 2024-11-21 8.8 - -
CVE-2023-25990 2023-11-03 2024-11-21 8.8 - -
CVE-2023-47532 2023-11-14 2024-11-21 5.8 - -
CVE-2023-5757 2023-12-11 2024-11-21 4.8 - -
CVE-2023-49829 2023-12-15 2024-11-21 5.9 - -
CVE-2023-50859 2023-12-28 2024-11-21 6.5 - -
CVE-2023-6161 2024-01-08 2025-06-17 6.1 - -
CVE-2023-6163 2024-01-15 2025-06-09 4.8 - -
CVE-2023-0376 2024-01-16 2025-06-02 5.4 - -
CVE-2024-1128 2024-02-29 2025-01-15 5.4 - -
CVE-2024-1133 2024-02-29 2025-01-15 4.3 - -
CVE-2024-1751 2024-03-13 2025-01-15 8.8 - -
CVE-2024-1502 2024-03-21 2025-01-15 5.4 - -
CVE-2024-1503 2024-03-21 2025-01-15 4.3 - -
CVE-2024-29913 2024-03-27 2025-01-28 6.5 - -
CVE-2024-3994 2024-04-25 2025-01-15 5.4 - -
CVE-2024-3553 2024-05-02 2025-01-15 6.5 - -
CVE-2024-4279 2024-05-16 2025-01-24 6.5 - -
CVE-2024-4318 2024-05-16 2025-01-24 8.8 - -
CVE-2024-4223 2024-05-16 2025-01-24 9.8 - -
CVE-2024-4222 2024-05-16 2025-01-22 7.3 - -
CVE-2024-4351 2024-05-16 2025-01-22 8.8 - -
CVE-2024-4352 2024-05-16 2025-01-22 8.8 - -
CVE-2024-4902 2024-06-07 2024-11-21 7.2 - -
CVE-2024-5438 2024-06-07 2024-11-21 4.3 - -
CVE-2023-25799 2024-06-11 2024-11-21 8.3 - -
CVE-2024-37256 2024-07-09 2024-11-21 7.6 - -
CVE-2024-37266 2024-07-09 2024-11-21 4.9 - -
CVE-2024-37947 2024-07-20 2025-02-03 5.9 - -
CVE-2024-1798 2024-07-27 2024-11-21 5.3 - -
CVE-2024-1804 2024-07-27 2024-11-21 4.3 - -
CVE-2024-43231 2024-08-12 2025-01-22 6.5 - -
CVE-2024-43282 2024-08-18 2025-01-22 7.6 - -
CVE-2024-5576 2024-08-20 2025-01-29 6.4 - -
CVE-2024-39645 2024-08-26 2024-09-18 5.4 - -
CVE-2024-43954 2024-08-29 2024-08-30 6.3 - -
CVE-2024-43955 2024-08-29 2024-08-30 10.0 - -
CVE-2024-5784 2024-08-30 2025-07-11 7.1 - -
CVE-2023-2919 2024-09-10 2024-09-26 4.3 - -
CVE-2024-10117 2024-10-26 2025-02-11 6.4 - -
CVE-2024-43142 2024-11-01 2025-04-04 4.3 - -
CVE-2024-43937 2024-11-01 2024-11-08 6.4 - -
CVE-2024-10897 2024-11-15 2024-11-20 4.3 - -
CVE-2024-10393 2024-11-21 2025-01-23 5.3 - -
CVE-2024-10400 2024-11-21 2025-01-23 7.5 - -
CVE-2024-53816 2024-12-09 2025-02-03 4.3 - -
CVE-2024-11910 2024-12-13 2025-02-11 6.4 - -
CVE-2024-11911 2024-12-13 2025-02-11 4.3 - -
CVE-2023-41870 2024-12-13 2025-02-11 4.3 - -
CVE-2024-9601 2025-02-14 2025-02-25 6.5 - -
CVE-2025-26767 2025-02-16 2025-05-23 6.5 - -
CVE-2024-13228 2025-03-11 2025-05-26 4.3 - -
CVE-2025-1508 2025-03-12 2025-03-20 5.3 - -
CVE-2025-5831 2025-07-25 2025-07-28 8.8 - -
CVE-2025-5835 2025-07-25 2025-07-28 8.8 - -
CVE-2025-11564 2025-10-25 2025-12-05 5.3 - -
CVE-2025-6680 2025-10-25 2025-12-05 4.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for themeum by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with themeum's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.