Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

xoops

About This Vendor

xoops is a technology vendor producing software and infrastructure products. As a software provider, xoops's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of xoops's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 101 known vulnerabilities from xoops. This includes 2 critical-severity issues and 50 high-severity issues that represent significant risk. These vulnerabilities affect 64 distinct products across xoops's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2002 through 2023, indicating decades of continuous security attention and research. Organizations deploying xoops products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2002-0216 2002-05-16 2026-04-16 - 5.0 Likely
CVE-2002-0217 2002-05-16 2026-04-16 - 7.5 Likely
CVE-2002-1802 2002-12-31 2026-04-16 - 4.3 Likely
CVE-2002-2386 2002-12-31 2026-04-16 - 4.3 Likely
CVE-2002-2391 2002-12-31 2026-04-16 - 7.5 Likely
CVE-2003-1453 2003-12-31 2026-04-16 - 4.3 Likely
CVE-2003-1550 2003-12-31 2026-04-16 - 5.0 Likely
CVE-2004-1640 2004-08-28 2026-04-16 - 4.3 Likely
CVE-2004-2756 2004-12-31 2026-04-16 - 4.3 Likely
CVE-2005-0743 2005-05-02 2026-04-16 - 7.5 Likely
CVE-2005-2112 2005-07-05 2026-04-16 - 4.3 Likely
CVE-2005-2113 2005-07-05 2026-04-16 - 7.5 Likely
CVE-2005-2338 2005-10-27 2026-04-16 - 4.3 Likely
CVE-2005-3680 2005-11-18 2026-04-16 - 6.4 Likely
CVE-2005-3681 2005-11-18 2026-04-16 - 7.5 Likely
CVE-2006-0198 2006-01-13 2026-04-16 - 4.3 Likely
CVE-2006-2516 2006-05-22 2026-04-16 - 5.1 Unknown
CVE-2006-3363 2006-07-06 2026-04-16 - 5.1 Unknown
CVE-2006-4417 2006-08-28 2026-04-16 - 7.5 Likely
CVE-2006-5532 2006-10-26 2026-04-23 - 6.8 Likely
CVE-2006-5810 2006-11-08 2026-04-23 - 6.8 Likely
CVE-2007-0377 2007-01-19 2026-04-23 - 7.5 Likely
CVE-2007-1814 2007-04-02 2026-04-23 - 7.5 Likely
CVE-2007-1815 2007-04-02 2026-04-23 - 7.5 Likely
CVE-2007-1816 2007-04-02 2026-04-23 - 7.5 Likely
CVE-2007-1838 2007-04-03 2026-04-23 - 7.5 Likely
CVE-2007-1846 2007-04-03 2026-04-23 - 7.5 Likely
CVE-2007-1847 2007-04-03 2026-04-23 - 7.5 Likely
CVE-2007-1960 2007-04-11 2026-04-23 - 7.5 Likely
CVE-2007-1962 2007-04-11 2026-04-23 - 7.5 Likely
CVE-2007-1974 2007-04-12 2026-04-23 - 7.5 Likely
CVE-2007-1976 2007-04-12 2026-04-23 - 7.5 Likely
CVE-2007-1979 2007-04-12 2026-04-23 - 7.5 Likely
CVE-2007-2370 2007-04-30 2026-04-23 - 7.5 Likely
CVE-2007-2543 2007-05-09 2026-04-23 - 7.5 Likely
CVE-2007-2571 2007-05-09 2026-04-23 - 7.5 Likely
CVE-2007-2737 2007-05-17 2026-04-23 - 7.5 Likely
CVE-2007-2738 2007-05-17 2026-04-23 - 7.5 Likely
CVE-2007-3057 2007-06-06 2026-04-23 - 6.8 Likely
CVE-2007-3220 2007-06-14 2026-04-23 - 6.8 Likely
CVE-2007-3221 2007-06-14 2026-04-23 - 6.8 Likely
CVE-2007-3222 2007-06-14 2026-04-23 - 7.5 Likely
CVE-2007-3236 2007-06-15 2026-04-23 - 7.5 Likely
CVE-2007-3237 2007-06-15 2026-04-23 - 6.8 Likely
CVE-2007-3289 2007-06-20 2026-04-23 - 7.5 Likely
CVE-2007-3311 2007-06-21 2026-04-23 - 7.5 Likely
CVE-2007-5188 2007-10-03 2026-04-23 - 7.5 Likely
CVE-2007-5978 2007-11-15 2026-04-23 - 7.5 Likely
CVE-2007-6675 2008-01-08 2026-04-23 - 5.0 Likely
CVE-2008-0138 2008-01-08 2026-04-23 - 6.8 Likely
CVE-2008-0611 2008-02-06 2026-04-23 - 7.5 Likely
CVE-2008-0612 2008-02-06 2026-04-23 - 7.5 Likely
CVE-2008-0613 2008-02-06 2026-04-23 - 5.0 Likely
CVE-2008-0847 2008-02-21 2026-04-23 - 7.5 Likely
CVE-2008-0874 2008-02-21 2026-04-23 - 7.5 Likely
CVE-2008-0936 2008-02-25 2026-04-23 - 7.5 Likely
CVE-2008-0937 2008-02-25 2026-04-23 - 6.8 Likely
CVE-2008-1063 2008-02-28 2026-04-23 - 4.3 Likely
CVE-2008-1064 2008-02-28 2026-04-23 - 4.3 Likely
CVE-2008-1065 2008-02-28 2026-04-23 - 7.5 Likely
CVE-2008-1351 2008-03-17 2026-04-23 - 7.5 Likely
CVE-2008-2035 2008-04-30 2026-04-23 - 4.3 Likely
CVE-2008-2094 2008-05-06 2026-04-23 - 7.5 Likely
CVE-2008-3295 2008-07-25 2026-04-23 - 4.3 Likely
CVE-2008-3296 2008-07-25 2026-04-23 - 7.5 Likely
CVE-2008-3560 2008-08-08 2026-04-23 - 4.3 Likely
CVE-2008-4053 2008-09-11 2026-04-23 - 4.3 Likely
CVE-2008-4432 2008-10-03 2026-04-23 - 4.3 Likely
CVE-2008-4433 2008-10-03 2026-04-23 - 7.5 Likely
CVE-2008-4435 2008-10-03 2026-04-23 - 4.3 Likely
CVE-2008-4635 2008-10-21 2026-04-23 - 5.0 Likely
CVE-2008-4653 2008-10-22 2026-04-23 - 7.5 Likely
CVE-2008-5321 2008-12-03 2026-04-23 - 7.5 Likely
CVE-2008-5665 2008-12-19 2026-04-23 - 7.5 Likely
CVE-2008-5768 2008-12-30 2026-04-23 - 7.5 Likely
CVE-2009-0805 2009-03-04 2026-04-23 - 4.3 Likely
CVE-2009-2162 2009-06-22 2026-04-23 - 4.3 Likely
CVE-2008-6884 2009-07-31 2026-04-23 - 6.8 Likely
CVE-2008-6885 2009-07-31 2026-04-23 - 4.3 Likely
CVE-2009-2783 2009-08-17 2026-04-23 - 4.3 Likely
CVE-2008-7178 2009-09-08 2026-04-23 - 7.5 Likely
CVE-2009-3240 2009-09-18 2026-04-23 - 4.3 Likely
CVE-2009-3963 2009-11-17 2026-04-23 - 7.5 Likely
CVE-2009-4359 2009-12-20 2026-04-23 - 4.3 Likely
CVE-2009-4360 2009-12-20 2026-04-23 - 7.5 Likely
CVE-2009-4582 2010-01-06 2026-04-23 - 7.5 Likely
CVE-2009-4698 2010-03-15 2025-04-11 - 7.5 Likely
CVE-2009-4851 2010-05-07 2025-04-11 - 5.0 Likely
CVE-2011-3822 2011-09-24 2025-04-11 - 5.0 Likely
CVE-2011-4565 2011-11-28 2025-04-11 - 4.3 Likely
CVE-2014-3935 2014-06-02 2025-04-12 - 7.5 Likely
CVE-2012-0984 2014-09-11 2025-04-12 - 4.3 Likely
CVE-2014-8999 2014-11-20 2025-04-12 - 6.5 Likely
CVE-2017-7290 2017-03-30 2025-04-20 7.2 6.5 Likely
CVE-2017-7944 2017-04-24 2025-04-20 6.1 4.3 Likely
CVE-2017-11174 2017-07-12 2025-04-20 9.8 7.5 Likely
CVE-2017-12138 2017-08-02 2025-04-20 6.1 5.8 Likely
CVE-2017-12139 2017-08-02 2025-04-20 6.1 4.3 Likely
CVE-2019-16683 2019-09-30 2024-11-21 4.8 3.5 Unknown
CVE-2019-16684 2019-09-30 2024-11-21 4.8 3.5 Unknown
CVE-2023-36217 2023-08-03 2024-11-21 9.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for xoops by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with xoops's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.