Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

microweber

About This Vendor

microweber is a technology vendor producing software and infrastructure products. As a software provider, microweber's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of microweber's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 115 known vulnerabilities from microweber. This includes 3 critical-severity issues and 26 high-severity issues that represent significant risk. These vulnerabilities affect 2 distinct products across microweber's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2026, indicating decades of continuous security attention and research. Organizations deploying microweber products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2013-5984 2014-05-12 2025-04-12 - 6.4 Likely
CVE-2014-9464 2015-01-03 2025-04-12 - 7.5 Likely
CVE-2018-17104 2018-09-16 2024-11-21 8.8 6.8 Likely
CVE-2018-1000826 2018-12-20 2024-11-21 6.1 4.3 Likely
CVE-2018-19917 2019-03-21 2024-11-21 6.1 4.3 Likely
CVE-2020-13241 2020-05-20 2024-11-21 7.8 7.2 Unknown
CVE-2020-13405 2020-07-16 2024-11-21 7.5 5.0 Likely
CVE-2020-23136 2020-11-09 2024-11-21 5.5 2.1 Unknown
CVE-2020-23138 2020-11-09 2024-11-21 9.8 7.5 Likely
CVE-2020-23139 2020-11-09 2024-11-21 5.5 2.1 Unknown
CVE-2020-23140 2020-11-09 2024-11-21 8.1 5.8 Likely
CVE-2020-28337 2021-02-15 2024-11-21 7.2 6.5 Likely
CVE-2021-33988 2021-10-19 2024-11-21 6.1 4.3 Likely
CVE-2022-0277 2022-01-20 2024-11-21 6.5 4.0 Likely
CVE-2022-0278 2022-01-20 2024-11-21 5.4 3.5 Unknown
CVE-2022-0281 2022-01-20 2024-11-21 7.5 5.0 Likely
CVE-2022-0282 2022-01-20 2026-02-24 4.3 5.0 Likely
CVE-2022-0378 2022-01-26 2024-11-21 5.4 4.3 Likely
CVE-2022-0379 2022-01-26 2024-11-21 5.4 3.5 Unknown
CVE-2022-0504 2022-02-08 2024-11-21 6.5 4.0 Likely
CVE-2022-0505 2022-02-08 2024-11-21 6.5 4.3 Likely
CVE-2022-0506 2022-02-08 2024-11-21 5.4 3.5 Unknown
CVE-2022-0558 2022-02-10 2024-11-21 5.4 3.5 Unknown
CVE-2022-0557 2022-02-11 2024-11-21 7.2 9.0 Likely
CVE-2022-0560 2022-02-11 2024-11-21 6.1 5.8 Likely
CVE-2022-0596 2022-02-15 2024-11-21 4.3 4.0 Likely
CVE-2022-0597 2022-02-15 2024-11-21 6.1 5.8 Likely
CVE-2022-0638 2022-02-17 2024-11-21 4.3 4.3 Likely
CVE-2022-0660 2022-02-18 2024-11-21 7.5 5.0 Likely
CVE-2022-0666 2022-02-18 2024-11-21 7.5 5.0 Likely
CVE-2022-0678 2022-02-19 2024-11-21 6.1 4.3 Likely
CVE-2022-0689 2022-02-19 2024-11-21 5.3 5.0 Likely
CVE-2022-0690 2022-02-19 2024-11-21 6.1 4.3 Likely
CVE-2022-0688 2022-02-20 2024-11-21 4.9 4.0 Likely
CVE-2022-0719 2022-02-23 2024-11-21 5.4 3.5 Unknown
CVE-2022-0721 2022-02-23 2024-11-21 6.5 4.0 Likely
CVE-2022-0724 2022-02-23 2024-11-21 6.5 4.0 Likely
CVE-2022-0762 2022-02-26 2026-02-24 5.5 4.0 Likely
CVE-2022-0763 2022-02-26 2024-11-21 4.8 3.5 Unknown
CVE-2022-0723 2022-02-26 2024-11-21 5.4 3.5 Unknown
CVE-2022-0777 2022-03-01 2024-11-21 7.5 5.0 Likely
CVE-2022-0855 2022-03-04 2024-11-21 6.1 5.8 Likely
CVE-2022-0896 2022-03-09 2024-11-21 8.8 6.8 Likely
CVE-2022-0895 2022-03-10 2024-11-21 9.8 7.5 Likely
CVE-2022-0906 2022-03-10 2024-11-21 4.8 3.5 Unknown
CVE-2022-0912 2022-03-11 2024-11-21 4.8 3.5 Unknown
CVE-2022-0913 2022-03-11 2024-11-21 7.5 5.0 Likely
CVE-2022-0928 2022-03-11 2024-11-21 5.4 3.5 Unknown
CVE-2022-0921 2022-03-11 2024-11-21 6.7 6.5 Likely
CVE-2022-0926 2022-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2022-0929 2022-03-12 2024-11-21 6.1 4.3 Likely
CVE-2022-0930 2022-03-12 2024-11-21 4.8 3.5 Unknown
CVE-2022-0954 2022-03-15 2024-11-21 5.4 3.5 Unknown
CVE-2022-0961 2022-03-15 2024-11-21 5.5 4.3 Likely
CVE-2022-0963 2022-03-15 2024-11-21 5.4 3.5 Unknown
CVE-2022-0968 2022-03-15 2024-11-21 5.5 4.0 Likely
CVE-2022-1036 2022-03-22 2024-11-21 7.5 5.0 Likely
CVE-2022-1439 2022-04-22 2024-11-21 6.1 4.3 Likely
CVE-2022-1504 2022-04-27 2024-11-21 6.1 4.3 Likely
CVE-2022-1555 2022-05-04 2024-11-21 6.1 4.3 Likely
CVE-2022-1584 2022-05-04 2024-11-21 6.1 4.3 Likely
CVE-2022-1631 2022-05-09 2024-11-21 8.8 6.8 Likely
CVE-2022-2130 2022-06-20 2024-11-21 6.1 4.3 Likely
CVE-2022-2174 2022-06-22 2024-11-21 6.1 4.3 Likely
CVE-2022-2252 2022-06-29 2024-11-21 6.1 5.8 Likely
CVE-2022-2280 2022-07-01 2024-11-21 5.4 3.5 Unknown
CVE-2022-2300 2022-07-04 2024-11-21 5.4 3.5 Unknown
CVE-2022-2353 2022-07-09 2024-11-21 6.1 4.3 Likely
CVE-2022-2368 2022-07-11 2026-02-25 6.5 7.5 Likely
CVE-2021-36461 2022-07-15 2024-11-21 8.8 6.5 Likely
CVE-2022-2495 2022-07-22 2024-11-21 4.8 - -
CVE-2022-2470 2022-07-22 2024-11-21 6.1 - -
CVE-2022-2777 2022-08-11 2024-11-21 5.4 - -
CVE-2022-3242 2022-09-20 2024-11-21 6.1 - -
CVE-2022-3245 2022-09-20 2024-11-21 6.1 - -
CVE-2022-33012 2022-11-22 2025-04-29 8.8 - -
CVE-2022-0698 2022-11-25 2025-04-25 6.1 - -
CVE-2022-4617 2022-12-21 2024-11-21 6.1 - -
CVE-2022-4647 2022-12-22 2024-11-21 6.1 - -
CVE-2022-4732 2022-12-27 2024-11-21 7.2 - -
CVE-2023-0608 2023-02-01 2024-11-21 5.4 - -
CVE-2021-32856 2023-02-21 2024-11-21 6.1 - -
CVE-2023-1081 2023-02-28 2024-11-21 4.8 - -
CVE-2023-1877 2023-04-05 2024-11-21 9.8 - -
CVE-2023-1881 2023-04-05 2024-11-21 5.4 - -
CVE-2023-2014 2023-04-13 2024-11-21 4.8 - -
CVE-2023-2240 2023-04-22 2024-11-21 8.8 - -
CVE-2023-2239 2023-04-22 2024-11-21 6.5 - -
CVE-2023-3142 2023-06-07 2024-11-21 5.4 - -
CVE-2023-5244 2023-09-28 2024-11-21 6.1 - -
CVE-2023-5318 2023-09-30 2024-11-21 7.5 - -
CVE-2023-5861 2023-10-31 2024-11-21 4.8 - -
CVE-2023-5976 2023-11-07 2024-11-21 4.3 - -
CVE-2023-47379 2023-11-08 2024-11-21 5.4 - -
CVE-2023-49052 2023-11-30 2024-11-21 8.8 - -
CVE-2023-6566 2023-12-07 2024-11-21 6.5 - -
CVE-2023-6599 2023-12-08 2024-11-21 4.3 - -
CVE-2023-48122 2023-12-08 2024-11-21 7.5 - -
CVE-2023-6832 2023-12-15 2024-11-21 4.3 - -
CVE-2024-41380 2024-08-05 2025-07-10 6.1 - -
CVE-2024-41381 2024-08-05 2025-07-10 6.1 - -
CVE-2024-40101 2024-08-06 2025-03-25 6.1 - -
CVE-2024-33297 2025-01-10 2025-07-03 4.7 - -
CVE-2024-33298 2025-01-10 2025-07-03 6.1 - -
CVE-2024-33299 2025-01-10 2025-07-03 4.7 - -
CVE-2025-2214 2025-03-12 2025-07-09 3.5 4.0 Likely
CVE-2025-34076 2025-07-02 2025-08-20 7.2 - -
CVE-2025-51503 2025-07-31 2025-08-06 7.6 - -
CVE-2025-51501 2025-08-01 2025-08-19 6.1 - -
CVE-2025-51502 2025-08-01 2025-08-19 6.1 - -
CVE-2025-51504 2025-08-01 2025-08-19 7.6 - -
CVE-2025-60954 2025-10-24 2025-10-28 8.3 - -
CVE-2024-58289 2025-12-11 2026-01-12 5.4 - -
CVE-2025-70791 2026-02-05 2026-02-10 6.1 - -
CVE-2025-70792 2026-02-05 2026-02-10 6.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for microweber by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with microweber's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.