Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mutt

About This Vendor

mutt is a technology vendor producing software and infrastructure products. As a software provider, mutt's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mutt's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 46 known vulnerabilities from mutt. This includes 12 critical-severity issues and 10 high-severity issues that represent significant risk. These vulnerabilities affect 30 distinct products across mutt's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1998 through 2024, indicating decades of continuous security attention and research. Organizations deploying mutt products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-0941 1998-07-28 2025-04-03 - 7.5 Likely
CVE-1999-0940 1999-09-27 2025-04-03 - 7.5 Likely
CVE-2001-0473 2001-06-27 2025-04-03 - 7.5 Likely
CVE-2002-0001 2002-02-27 2025-04-03 - 7.5 Likely
CVE-2003-0140 2003-03-24 2025-04-03 - 7.5 Likely
CVE-2003-0167 2003-04-02 2025-04-03 - 7.5 Likely
CVE-2003-0299 2003-06-16 2025-04-03 - 7.5 Likely
CVE-2003-0300 2003-06-16 2025-04-03 - 5.0 Likely
CVE-2004-0078 2004-03-03 2025-04-03 - 7.5 Likely
CVE-2005-2642 2005-08-23 2025-04-03 - 7.5 Likely
CVE-2006-3242 2006-06-27 2025-04-03 - 7.5 Likely
CVE-2006-5297 2006-10-16 2025-04-09 - 1.2 Unknown
CVE-2006-5298 2006-10-16 2025-04-09 - 1.2 Unknown
CVE-2007-1268 2007-03-06 2025-04-09 - 5.0 Likely
CVE-2007-2683 2007-05-15 2025-04-09 - 3.5 Unknown
CVE-2009-1390 2009-06-16 2025-04-09 - 6.8 Likely
CVE-2009-3765 2009-10-23 2025-04-09 - 6.8 Likely
CVE-2009-3766 2009-10-23 2025-04-09 - 6.8 Likely
CVE-2011-1429 2011-03-16 2025-04-11 - 5.8 Likely
CVE-2014-0467 2014-03-14 2025-04-12 - 5.0 Likely
CVE-2014-9116 2014-12-02 2025-04-12 - 5.0 Likely
CVE-2018-14349 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14350 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14351 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14352 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14353 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14354 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14355 2018-07-17 2024-11-21 5.3 5.0 Likely
CVE-2018-14356 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14357 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14358 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14359 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2018-14362 2018-07-17 2024-11-21 9.8 7.5 Likely
CVE-2005-2351 2019-11-01 2024-11-20 5.5 2.1 Unknown
CVE-2020-14093 2020-06-15 2024-11-21 5.9 4.3 Likely
CVE-2020-14154 2020-06-15 2024-11-21 4.8 5.8 Likely
CVE-2020-14954 2020-06-21 2024-11-21 5.9 4.3 Likely
CVE-2020-28896 2020-11-23 2024-11-21 5.3 2.6 Unknown
CVE-2021-3181 2021-01-19 2024-11-21 6.5 4.3 Likely
CVE-2021-32055 2021-05-05 2024-11-21 9.1 5.8 Likely
CVE-2022-1328 2022-04-14 2024-11-21 4.3 5.0 Likely
CVE-2023-4874 2023-09-09 2024-11-21 4.3 - -
CVE-2023-4875 2023-09-09 2024-11-21 2.2 - -
CVE-2024-49393 2024-11-12 2025-07-16 6.5 - -
CVE-2024-49394 2024-11-12 2024-11-14 5.3 - -
CVE-2024-49395 2024-11-12 2024-11-14 5.3 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mutt by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mutt's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.