Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

horde

About This Vendor

horde is a technology vendor producing software and infrastructure products. As a software provider, horde's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of horde's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 115 known vulnerabilities from horde. This includes 1 critical-severity issue and 21 high-severity issues that represent significant risk. These vulnerabilities affect 58 distinct products across horde's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2000 through 2025, indicating decades of continuous security attention and research. Organizations deploying horde products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2000-0910 2000-12-19 2025-04-03 - 4.6 Unknown
CVE-2000-0911 2000-12-19 2025-04-03 - 5.0 Likely
CVE-2001-1257 2001-07-21 2025-04-03 - 7.5 Likely
CVE-2001-1258 2001-07-21 2025-04-03 - 3.6 Unknown
CVE-2001-0744 2001-10-18 2025-04-03 - 2.1 Unknown
CVE-2002-0181 2002-04-22 2025-04-03 - 7.5 Likely
CVE-2002-2024 2002-12-31 2025-04-03 5.3 5.0 Likely
CVE-2003-0025 2003-01-17 2025-04-03 - 7.5 Likely
CVE-2003-0728 2003-10-20 2025-04-03 - 6.4 Likely
CVE-2004-0584 2004-08-06 2025-04-03 - 6.8 Likely
CVE-2004-1443 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2004-2741 2004-12-31 2025-04-03 - 4.3 Likely
CVE-2005-1317 2005-04-25 2025-04-03 - 6.8 Likely
CVE-2005-0378 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-0961 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1313 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1314 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1315 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1316 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1318 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1319 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1320 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1321 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-1322 2005-05-02 2025-04-03 - 4.3 Likely
CVE-2005-3344 2005-11-16 2025-04-03 - 10.0 Likely
CVE-2005-3570 2005-11-16 2025-04-03 - 4.3 Likely
CVE-2005-3759 2005-11-22 2025-04-03 - 5.8 Likely
CVE-2005-4080 2005-12-08 2025-04-03 - 4.3 Likely
CVE-2005-4189 2005-12-13 2025-04-03 - 3.5 Unknown
CVE-2005-4190 2005-12-13 2025-04-03 - 3.5 Unknown
CVE-2005-4191 2005-12-13 2025-04-03 - 3.5 Unknown
CVE-2005-4192 2005-12-13 2025-04-03 - 3.5 Unknown
CVE-2005-4242 2005-12-14 2025-04-03 - 4.3 Likely
CVE-2006-1260 2006-03-19 2025-04-03 - 5.0 Likely
CVE-2006-1491 2006-03-29 2025-04-03 - 7.5 Likely
CVE-2006-2195 2006-06-15 2025-04-03 - 6.8 Likely
CVE-2006-3548 2006-07-13 2025-04-03 - 4.3 Likely
CVE-2006-3549 2006-07-13 2025-04-03 - 5.0 Likely
CVE-2006-4255 2006-08-21 2025-04-03 - 4.3 Likely
CVE-2006-4256 2006-08-21 2025-04-03 - 4.3 Likely
CVE-2006-5449 2006-10-23 2025-04-09 - 6.5 Likely
CVE-2006-6175 2006-11-30 2025-04-09 - 7.5 Likely
CVE-2007-0579 2007-01-30 2025-04-09 - 5.1 Unknown
CVE-2007-1473 2007-03-16 2025-04-09 - 4.3 Likely
CVE-2007-1474 2007-03-16 2025-04-09 - 6.8 Likely
CVE-2007-1515 2007-03-20 2025-04-09 - 4.3 Likely
CVE-2007-1679 2007-03-26 2025-04-09 5.4 4.3 Likely
CVE-2007-6018 2008-01-11 2025-04-09 - 5.8 Likely
CVE-2008-0807 2008-02-19 2025-04-09 - 4.9 Unknown
CVE-2008-1284 2008-03-11 2025-04-09 - 6.0 Unknown
CVE-2008-1974 2008-04-27 2025-04-09 - 4.3 Likely
CVE-2008-2783 2008-06-19 2025-04-09 - 4.3 Likely
CVE-2008-3650 2008-08-13 2025-04-09 - 9.0 Likely
CVE-2008-3823 2008-09-12 2025-04-09 - 4.3 Likely
CVE-2008-3824 2008-09-12 2025-04-09 - 4.3 Likely
CVE-2008-4182 2008-09-23 2025-04-09 - 4.3 Likely
CVE-2008-5917 2009-01-21 2025-04-09 - 4.3 Likely
CVE-2008-6746 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-2360 2009-07-08 2025-04-09 - 4.3 Likely
CVE-2008-7218 2009-09-13 2025-04-09 - 10.0 Likely
CVE-2008-7219 2009-09-13 2025-04-09 - 10.0 Likely
CVE-2009-3236 2009-09-17 2025-04-09 - 4.3 Likely
CVE-2009-3237 2009-09-17 2025-04-09 - 4.3 Likely
CVE-2009-3701 2009-12-21 2025-04-09 - 4.3 Likely
CVE-2009-4363 2009-12-21 2025-04-09 - 4.3 Likely
CVE-2010-0463 2010-01-29 2025-04-11 - 5.0 Likely
CVE-2010-1638 2010-06-22 2025-04-11 - 5.0 Likely
CVE-2010-3077 2010-11-09 2025-04-11 - 4.3 Likely
CVE-2010-3694 2010-11-09 2025-04-11 - 6.8 Likely
CVE-2010-3695 2011-03-31 2025-04-11 - 4.3 Likely
CVE-2010-3447 2011-04-04 2025-04-11 - 4.3 Likely
CVE-2010-3693 2011-04-04 2025-04-11 - 4.3 Likely
CVE-2010-4778 2011-04-04 2025-04-11 - 4.3 Likely
CVE-2012-0791 2012-01-24 2025-04-11 - 4.3 Likely
CVE-2012-0909 2012-01-24 2025-04-11 - 4.3 Likely
CVE-2012-0209 2012-09-25 2025-04-11 - 7.5 Likely
CVE-2012-6620 2014-01-16 2025-04-11 - 4.3 Likely
CVE-2014-1691 2014-04-01 2025-04-12 - 7.5 Likely
CVE-2012-5565 2014-04-05 2025-04-12 - 4.3 Likely
CVE-2012-5566 2014-04-05 2025-04-12 - 4.3 Likely
CVE-2012-5567 2014-04-05 2025-04-12 - 4.3 Likely
CVE-2012-6640 2014-04-05 2025-04-12 - 4.3 Likely
CVE-2014-4945 2014-07-14 2025-04-12 - 4.3 Likely
CVE-2014-4946 2014-07-14 2025-04-12 - 4.3 Likely
CVE-2015-7984 2015-11-19 2025-04-12 - 6.8 Likely
CVE-2015-8807 2016-04-13 2025-04-12 6.1 4.3 Likely
CVE-2016-2228 2016-04-13 2025-04-12 6.1 4.3 Likely
CVE-2016-5303 2016-12-20 2025-04-12 6.1 4.3 Likely
CVE-2017-7413 2017-04-04 2025-04-20 8.8 9.0 Likely
CVE-2017-7414 2017-04-04 2025-04-20 7.5 5.1 Unknown
CVE-2017-9773 2017-06-21 2025-04-20 5.7 4.3 Likely
CVE-2017-9774 2017-06-21 2025-04-20 8.8 6.5 Likely
CVE-2017-14650 2017-09-21 2025-04-20 8.1 6.8 Likely
CVE-2017-15235 2017-10-11 2025-04-20 7.5 5.0 Likely
CVE-2017-16906 2017-11-20 2025-04-20 5.4 3.5 Unknown
CVE-2017-16907 2017-11-20 2025-04-20 5.4 3.5 Unknown
CVE-2017-16908 2017-11-20 2025-04-20 5.4 3.5 Unknown
CVE-2014-3999 2018-04-10 2024-11-21 8.1 6.8 Likely
CVE-2017-17688 2018-05-16 2024-11-21 5.9 4.3 Likely
CVE-2017-17689 2018-05-16 2024-11-21 5.9 4.3 Likely
CVE-2019-9858 2019-05-29 2024-11-21 8.8 6.5 Likely
CVE-2019-12094 2019-10-24 2024-11-21 6.1 4.3 Likely
CVE-2019-12095 2019-10-24 2024-11-21 8.8 6.8 Likely
CVE-2013-6364 2019-11-05 2024-11-21 8.8 6.8 Likely
CVE-2013-6365 2019-11-05 2024-11-21 5.3 2.6 Unknown
CVE-2013-6275 2019-11-05 2024-11-21 6.5 4.3 Likely
CVE-2020-8518 2020-02-17 2024-11-21 9.8 7.5 Likely
CVE-2020-8865 2020-03-23 2024-11-21 6.3 6.5 Likely
CVE-2020-8866 2020-03-23 2024-11-21 6.5 4.0 Likely
CVE-2020-8035 2020-05-18 2024-11-21 6.1 4.3 Likely
CVE-2020-8034 2020-05-18 2024-11-21 6.1 4.3 Likely
CVE-2021-26929 2021-02-14 2024-11-21 6.1 4.3 Likely
CVE-2022-26874 2022-03-11 2024-11-21 5.4 3.5 Unknown
CVE-2022-30287 2022-07-28 2024-11-21 8.0 - -
CVE-2025-41066 2025-12-02 2025-12-03 5.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for horde by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with horde's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.