Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mambo

About This Vendor

mambo is a technology vendor producing software and infrastructure products. As a software provider, mambo's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mambo's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 123 known vulnerabilities from mambo. This includes 1 critical-severity issue and 84 high-severity issues that represent significant risk. These vulnerabilities affect 95 distinct products across mambo's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2001 through 2009, reflecting sustained security scrutiny over multiple years. Organizations deploying mambo products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-1011 2001-07-25 2025-04-03 - 10.0 Likely
CVE-2002-1662 2002-12-31 2025-04-03 - 6.8 Likely
CVE-2002-2247 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2288 2002-12-31 2025-04-03 - 5.0 Likely
CVE-2002-2290 2002-12-31 2025-04-03 - 10.0 Likely
CVE-2003-1203 2003-03-18 2025-04-03 - 4.3 Likely
CVE-2003-1204 2003-12-31 2025-04-03 - 6.8 Likely
CVE-2003-1245 2003-12-31 2025-04-03 - 10.0 Likely
CVE-2004-1825 2004-03-16 2025-04-03 - 4.3 Likely
CVE-2004-1826 2004-03-16 2025-04-03 - 7.5 Likely
CVE-2004-1692 2004-09-18 2025-04-03 - 4.3 Likely
CVE-2004-1693 2004-09-18 2025-04-03 - 7.5 Likely
CVE-2004-2072 2004-12-31 2025-04-03 - 6.8 Likely
CVE-2004-2143 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2005-0512 2005-02-21 2025-04-03 - 7.5 Likely
CVE-2005-2002 2005-06-15 2025-04-03 - 7.5 Likely
CVE-2005-3586 2005-11-16 2025-04-03 - 5.0 Likely
CVE-2005-3738 2005-11-22 2025-04-03 - 2.6 Unknown
CVE-2005-4156 2005-12-11 2025-04-03 - 9.4 Likely
CVE-2006-0871 2006-02-24 2025-04-03 - 6.4 Likely
CVE-2006-1794 2006-04-17 2025-04-03 - 7.6 Unknown
CVE-2006-1956 2006-04-21 2025-04-03 - 5.0 Likely
CVE-2006-3262 2006-06-27 2025-04-03 - 7.5 Likely
CVE-2006-3263 2006-06-27 2025-04-03 - 7.5 Likely
CVE-2006-3736 2006-07-21 2025-04-03 - 7.5 Likely
CVE-2006-3749 2006-07-21 2025-04-03 - 6.8 Likely
CVE-2006-3773 2006-07-24 2025-04-03 - 6.8 Likely
CVE-2006-3843 2006-07-25 2025-04-03 - 7.5 Likely
CVE-2006-3846 2006-07-25 2025-04-03 - 6.8 Likely
CVE-2006-3947 2006-08-01 2025-04-03 - 6.8 Likely
CVE-2006-3949 2006-08-01 2025-04-03 - 6.8 Likely
CVE-2006-3962 2006-08-01 2025-04-03 - 7.5 Likely
CVE-2006-3980 2006-08-05 2025-04-03 - 6.8 Likely
CVE-2006-3981 2006-08-05 2025-04-03 - 7.5 Likely
CVE-2006-4229 2006-08-18 2025-04-03 - 7.5 Likely
CVE-2006-4264 2006-08-21 2025-04-03 9.8 7.5 Likely
CVE-2006-4269 2006-08-21 2025-04-03 - 7.5 Likely
CVE-2006-4270 2006-08-21 2025-04-03 - 6.8 Likely
CVE-2006-4275 2006-08-21 2025-04-03 - 7.5 Likely
CVE-2006-4280 2006-08-21 2025-04-03 - 7.5 Likely
CVE-2006-4286 2006-08-22 2025-04-03 - 7.5 Likely
CVE-2006-4288 2006-08-22 2025-04-03 - 6.8 Likely
CVE-2006-4296 2006-08-23 2025-04-03 - 7.5 Likely
CVE-2006-4375 2006-08-26 2025-04-03 - 7.5 Likely
CVE-2006-4553 2006-09-06 2025-04-03 - 6.8 Likely
CVE-2006-4556 2006-09-06 2025-04-03 - 7.5 Likely
CVE-2006-5044 2006-09-27 2025-04-09 - 7.5 Likely
CVE-2006-6634 2006-12-18 2025-04-09 - 7.5 Likely
CVE-2007-0374 2007-01-19 2025-04-09 - 7.5 Likely
CVE-2007-0789 2007-02-06 2025-04-09 - 6.8 Likely
CVE-2006-7104 2007-03-03 2025-04-09 - 7.5 Likely
CVE-2006-7149 2007-03-07 2025-04-09 - 4.3 Likely
CVE-2006-7150 2007-03-07 2025-04-09 - 7.5 Likely
CVE-2007-1596 2007-03-22 2025-04-09 - 9.3 Likely
CVE-2007-1699 2007-03-27 2025-04-09 - 10.0 Likely
CVE-2007-1702 2007-03-27 2025-04-09 - 6.8 Likely
CVE-2007-2005 2007-04-12 2025-04-09 - 6.8 Likely
CVE-2007-2049 2007-04-16 2025-04-09 - 6.8 Likely
CVE-2007-2196 2007-04-24 2025-04-09 - 6.8 Likely
CVE-2006-7202 2007-05-09 2025-04-09 - 7.8 Likely
CVE-2007-2557 2007-05-09 2025-04-09 - 4.0 Likely
CVE-2007-4203 2007-08-08 2025-04-09 - 9.3 Likely
CVE-2007-4456 2007-08-21 2025-04-09 - 7.5 Likely
CVE-2007-4505 2007-08-23 2025-04-09 - 7.5 Likely
CVE-2007-4745 2007-09-06 2025-04-09 - 4.3 Likely
CVE-2007-5177 2007-10-03 2025-04-09 - 7.5 Likely
CVE-2007-5362 2007-10-11 2025-04-09 - 6.8 Likely
CVE-2007-6455 2007-12-20 2025-04-09 - 4.3 Likely
CVE-2008-0261 2008-01-15 2025-04-09 - 5.0 Likely
CVE-2008-0510 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0511 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0514 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0515 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0517 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0518 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0519 2008-01-31 2025-04-09 - 7.5 Likely
CVE-2008-0561 2008-02-04 2025-04-09 - 7.5 Likely
CVE-2008-0603 2008-02-06 2025-04-09 - 7.5 Likely
CVE-2008-0606 2008-02-06 2025-04-09 - 7.5 Likely
CVE-2008-0607 2008-02-06 2025-04-09 - 7.5 Likely
CVE-2008-0652 2008-02-07 2025-04-09 - 7.5 Likely
CVE-2008-0686 2008-02-12 2025-04-09 - 7.5 Likely
CVE-2008-0721 2008-02-12 2025-04-09 - 7.5 Likely
CVE-2008-0746 2008-02-13 2025-04-09 - 7.5 Likely
CVE-2008-0752 2008-02-13 2025-04-09 - 7.5 Likely
CVE-2008-0772 2008-02-14 2025-04-09 - 7.5 Likely
CVE-2008-0773 2008-02-14 2025-04-09 - 7.5 Likely
CVE-2008-0795 2008-02-15 2025-04-09 - 7.5 Likely
CVE-2008-0799 2008-02-15 2025-04-09 - 7.5 Likely
CVE-2008-0810 2008-02-19 2025-04-09 - 7.5 Likely
CVE-2008-0817 2008-02-19 2025-04-09 - 7.5 Likely
CVE-2008-0829 2008-02-19 2025-04-09 - 7.5 Likely
CVE-2008-0832 2008-02-20 2025-04-09 - 7.5 Likely
CVE-2008-0841 2008-02-20 2025-04-09 - 7.5 Likely
CVE-2008-0846 2008-02-20 2025-04-09 - 7.5 Likely
CVE-2008-0849 2008-02-21 2025-04-09 - 7.5 Likely
CVE-2008-0853 2008-02-21 2025-04-09 - 7.5 Likely
CVE-2008-0854 2008-02-21 2025-04-09 - 7.5 Likely
CVE-2008-0855 2008-02-21 2025-04-09 - 7.5 Likely
CVE-2008-1137 2008-03-04 2025-04-09 - 7.5 Likely
CVE-2008-1297 2008-03-12 2025-04-09 - 7.5 Likely
CVE-2008-1459 2008-03-24 2025-04-09 - 7.5 Likely
CVE-2008-1460 2008-03-24 2025-04-09 - 7.5 Likely
CVE-2008-1540 2008-03-28 2025-04-09 - 7.5 Likely
CVE-2008-1849 2008-04-16 2025-04-09 - 5.0 Likely
CVE-2008-2093 2008-05-06 2025-04-09 - 7.5 Likely
CVE-2008-2095 2008-05-06 2025-04-09 - 7.5 Likely
CVE-2008-2500 2008-05-29 2025-04-09 - 4.3 Likely
CVE-2008-2905 2008-06-30 2025-04-09 - 6.8 Likely
CVE-2008-2990 2008-07-02 2025-04-09 - 7.5 Likely
CVE-2008-3712 2008-08-19 2025-04-09 - 2.6 Unknown
CVE-2008-4777 2008-10-29 2025-04-09 - 7.5 Likely
CVE-2008-5200 2008-11-21 2025-04-09 - 7.5 Likely
CVE-2008-5208 2008-11-24 2025-04-09 - 7.5 Likely
CVE-2008-5226 2008-11-25 2025-04-09 - 7.5 Likely
CVE-2008-5643 2008-12-17 2025-04-09 - 7.5 Likely
CVE-2009-0706 2009-02-23 2025-04-09 - 7.5 Likely
CVE-2009-0726 2009-02-24 2025-04-09 - 7.5 Likely
CVE-2009-0730 2009-02-24 2025-04-09 - 6.8 Likely
CVE-2008-6653 2009-04-07 2025-04-09 - 7.5 Likely
CVE-2008-6814 2009-05-28 2025-04-09 - 6.8 Likely
CVE-2009-3333 2009-09-23 2025-04-09 - 7.5 Likely
CVE-2009-3434 2009-09-28 2025-04-09 - 7.5 Likely

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mambo by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mambo's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.