Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mahara

About This Vendor

mahara is a technology vendor producing software and infrastructure products. As a software provider, mahara's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mahara's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 109 known vulnerabilities from mahara. This includes 9 critical-severity issues and 20 high-severity issues that represent significant risk. These vulnerabilities affect 5 distinct products across mahara's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2025, indicating decades of continuous security attention and research. Organizations deploying mahara products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-0381 2008-01-22 2025-04-09 - 4.3 Likely
CVE-2009-0487 2009-02-09 2025-04-09 - 4.3 Likely
CVE-2009-0660 2009-03-11 2025-04-09 - 4.3 Likely
CVE-2009-0664 2009-04-23 2025-04-09 - 4.3 Likely
CVE-2009-2170 2009-06-23 2025-04-09 - 4.3 Likely
CVE-2009-2171 2009-06-23 2025-04-09 - 4.0 Likely
CVE-2009-3298 2009-11-03 2025-04-09 - 6.5 Likely
CVE-2009-3299 2009-11-03 2025-04-09 - 4.3 Likely
CVE-2010-0400 2010-04-07 2025-04-11 - 7.5 Likely
CVE-2010-1667 2010-07-06 2025-04-11 - 4.3 Likely
CVE-2010-1668 2010-07-06 2025-04-11 - 6.8 Likely
CVE-2010-1669 2010-07-06 2025-04-11 - 7.5 Likely
CVE-2010-1670 2010-07-06 2025-04-11 - 7.5 Likely
CVE-2010-2479 2010-07-06 2025-04-11 - 4.3 Likely
CVE-2010-3871 2010-11-09 2025-04-11 - 4.3 Likely
CVE-2011-0439 2011-03-28 2025-04-11 - 4.3 Likely
CVE-2011-0440 2011-03-28 2025-04-11 - 5.8 Likely
CVE-2011-1402 2011-05-13 2025-04-11 - 6.5 Likely
CVE-2011-1403 2011-05-13 2025-04-11 - 6.8 Likely
CVE-2011-1404 2011-05-13 2025-04-11 - 4.0 Likely
CVE-2011-1405 2011-05-13 2025-04-11 - 3.5 Unknown
CVE-2011-1406 2011-05-13 2025-04-11 - 4.3 Likely
CVE-2011-2771 2011-11-15 2025-04-11 - 4.3 Likely
CVE-2011-2772 2011-11-15 2025-04-11 - 5.0 Likely
CVE-2011-2773 2011-11-15 2025-04-11 - 6.8 Likely
CVE-2011-2774 2011-11-15 2025-04-11 - 4.0 Likely
CVE-2011-4118 2011-11-15 2025-04-11 - 6.0 Unknown
CVE-2012-2351 2012-07-12 2025-04-11 - 5.0 Likely
CVE-2012-2239 2012-11-24 2025-04-11 9.1 6.4 Likely
CVE-2012-2243 2012-11-24 2025-04-11 - 4.3 Likely
CVE-2012-2244 2012-11-24 2025-04-11 - 6.0 Unknown
CVE-2012-2246 2012-11-24 2025-04-11 - 6.8 Likely
CVE-2012-2247 2012-11-24 2025-04-11 - 4.3 Likely
CVE-2012-2253 2012-11-24 2025-04-11 - 4.3 Likely
CVE-2012-6037 2012-11-24 2025-04-11 - 4.3 Likely
CVE-2013-4429 2014-05-19 2025-04-12 - 4.0 Likely
CVE-2013-4430 2014-05-19 2025-04-12 - 4.3 Likely
CVE-2013-4431 2014-05-19 2025-04-12 - 5.5 Likely
CVE-2013-4432 2014-05-19 2025-04-12 - 4.0 Likely
CVE-2017-9551 2017-09-25 2025-04-20 6.1 4.3 Likely
CVE-2017-14163 2017-10-31 2025-04-20 8.8 6.5 Likely
CVE-2017-14752 2017-10-31 2025-04-20 5.4 3.5 Unknown
CVE-2017-15273 2017-10-31 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000131 2017-11-03 2025-04-20 6.5 4.0 Likely
CVE-2017-1000132 2017-11-03 2025-04-20 4.8 3.5 Unknown
CVE-2017-1000133 2017-11-03 2025-04-20 7.5 5.0 Likely
CVE-2017-1000134 2017-11-03 2025-04-20 8.1 6.5 Likely
CVE-2017-1000135 2017-11-03 2025-04-20 6.5 4.0 Likely
CVE-2017-1000136 2017-11-03 2025-04-20 6.5 4.3 Likely
CVE-2017-1000137 2017-11-03 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000138 2017-11-03 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000139 2017-11-03 2025-04-20 8.0 6.0 Unknown
CVE-2017-1000140 2017-11-03 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000142 2017-11-03 2025-04-20 6.5 5.5 Likely
CVE-2017-1000143 2017-11-03 2025-04-20 4.3 4.0 Likely
CVE-2017-1000144 2017-11-03 2025-04-20 4.8 3.5 Unknown
CVE-2017-1000145 2017-11-03 2025-04-20 4.9 4.0 Likely
CVE-2017-1000146 2017-11-03 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000147 2017-11-03 2025-04-20 6.8 6.0 Unknown
CVE-2017-1000148 2017-11-03 2025-04-20 8.8 6.5 Likely
CVE-2017-1000149 2017-11-03 2025-04-20 5.4 3.5 Unknown
CVE-2017-1000150 2017-11-03 2025-04-20 8.8 6.5 Likely
CVE-2017-1000151 2017-11-03 2025-04-20 7.5 5.0 Likely
CVE-2017-1000152 2017-11-03 2025-04-20 9.8 7.5 Likely
CVE-2017-1000153 2017-11-03 2025-04-20 9.8 7.5 Likely
CVE-2017-1000154 2017-11-03 2025-04-20 9.8 7.5 Likely
CVE-2017-1000155 2017-11-03 2025-04-20 4.3 4.0 Likely
CVE-2017-1000156 2017-11-03 2025-04-20 6.5 5.5 Likely
CVE-2017-1000157 2017-11-03 2025-04-20 4.4 3.5 Unknown
CVE-2017-1000171 2017-11-03 2025-04-20 9.8 5.0 Likely
CVE-2017-1000141 2018-01-30 2024-11-21 6.5 6.4 Likely
CVE-2017-17454 2018-02-20 2024-11-21 5.4 3.5 Unknown
CVE-2017-17455 2018-02-20 2024-11-21 5.9 4.3 Likely
CVE-2018-6182 2018-04-09 2024-11-21 6.1 4.3 Likely
CVE-2018-11565 2018-05-30 2024-11-21 5.3 5.0 Likely
CVE-2018-11195 2018-06-01 2024-11-21 6.8 2.1 Unknown
CVE-2018-11196 2018-06-01 2024-11-21 7.5 5.0 Likely
CVE-2019-9709 2019-05-07 2024-11-21 5.4 3.5 Unknown
CVE-2019-9708 2019-05-07 2024-11-21 4.9 4.0 Likely
CVE-2013-1426 2019-11-07 2024-11-21 6.1 4.3 Likely
CVE-2012-2237 2019-12-17 2024-11-21 6.1 4.3 Likely
CVE-2020-9282 2020-03-09 2024-11-21 6.5 4.0 Likely
CVE-2020-9386 2020-03-09 2024-11-21 4.3 4.0 Likely
CVE-2020-9387 2020-04-30 2024-11-21 4.3 3.5 Unknown
CVE-2020-15907 2020-08-07 2024-11-21 6.1 4.3 Likely
CVE-2021-29349 2021-03-31 2024-11-21 6.5 4.3 Likely
CVE-2021-43264 2021-11-02 2024-11-21 3.3 2.1 Unknown
CVE-2021-43265 2021-11-02 2024-11-21 5.4 3.5 Unknown
CVE-2021-43266 2021-11-02 2024-11-21 7.3 4.6 Unknown
CVE-2021-40848 2021-11-03 2024-11-21 7.8 6.8 Likely
CVE-2021-40849 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2022-24694 2022-02-09 2024-11-21 4.3 4.0 Likely
CVE-2022-24111 2022-02-10 2024-11-21 5.3 5.0 Likely
CVE-2022-28892 2022-04-28 2024-11-21 8.8 6.8 Likely
CVE-2022-29584 2022-04-28 2024-11-21 5.4 3.5 Unknown
CVE-2022-29585 2022-04-28 2024-11-21 7.5 5.0 Likely
CVE-2022-33913 2022-06-20 2024-11-21 7.5 4.3 Likely
CVE-2022-42707 2022-11-06 2025-05-02 7.5 - -
CVE-2022-44544 2022-11-06 2025-05-02 9.8 - -
CVE-2022-45134 2025-08-22 2025-09-08 9.8 - -
CVE-2022-45133 2025-08-22 2025-09-05 6.5 - -
CVE-2023-47799 2025-08-25 2025-09-05 7.5 - -
CVE-2024-39923 2025-08-25 2025-09-05 6.1 - -
CVE-2024-45753 2025-08-26 2025-09-05 6.1 - -
CVE-2024-47853 2025-08-26 2025-09-22 8.8 - -
CVE-2025-29992 2025-08-26 2025-09-05 7.5 - -
CVE-2024-39335 2025-08-26 2025-09-05 9.1 - -
CVE-2024-35203 2025-08-26 2025-09-05 6.1 - -
CVE-2024-47192 2025-08-26 2025-09-05 5.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mahara by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mahara's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.