Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

webmin

About This Vendor

webmin is a technology vendor producing software and infrastructure products. As a software provider, webmin's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of webmin's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 109 known vulnerabilities from webmin. This includes 7 critical-severity issues and 32 high-severity issues that represent significant risk. These vulnerabilities affect 9 distinct products across webmin's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2025, indicating decades of continuous security attention and research. Organizations deploying webmin products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1074 1999-12-31 2025-04-03 - 7.5 Likely
CVE-2001-0222 2001-03-26 2025-04-03 - 1.2 Unknown
CVE-2001-1074 2001-05-28 2025-04-03 - 7.2 Unknown
CVE-2001-1196 2001-12-17 2025-04-03 - 10.0 Likely
CVE-2001-1530 2001-12-31 2025-04-03 - 4.6 Unknown
CVE-2002-0756 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-0757 2002-08-12 2025-04-03 - 7.5 Likely
CVE-2002-1672 2002-12-31 2025-04-03 - 2.1 Unknown
CVE-2002-1673 2002-12-31 2025-04-03 - 3.6 Unknown
CVE-2002-1947 2002-12-31 2025-04-03 - 6.4 Likely
CVE-2002-2201 2002-12-31 2025-04-03 - 10.0 Likely
CVE-2002-2360 2002-12-31 2025-04-03 - 9.3 Likely
CVE-2003-0101 2003-03-03 2025-04-03 - 10.0 Likely
CVE-2004-0582 2004-08-06 2025-04-03 - 5.0 Likely
CVE-2004-0583 2004-08-06 2025-04-03 - 5.0 Likely
CVE-2004-0559 2004-10-20 2025-04-03 - 2.1 Unknown
CVE-2004-1468 2004-12-31 2025-04-03 - 7.5 Likely
CVE-2005-1177 2005-05-02 2025-04-03 - 10.0 Likely
CVE-2005-3042 2005-09-22 2025-04-03 - 7.5 Likely
CVE-2005-3912 2005-11-30 2025-04-03 - 7.5 Likely
CVE-2006-3274 2006-06-28 2025-04-03 - 5.0 Likely
CVE-2006-3392 2006-07-06 2025-04-03 - 5.0 Likely
CVE-2006-4542 2006-09-05 2025-04-03 - 6.8 Likely
CVE-2007-1276 2007-03-05 2025-04-09 - 4.3 Likely
CVE-2007-3156 2007-06-11 2025-04-09 - 4.3 Likely
CVE-2007-5066 2007-09-24 2025-04-09 - 9.0 Likely
CVE-2008-0720 2008-02-12 2025-04-09 - 4.3 Likely
CVE-2009-4568 2010-01-05 2025-04-09 - 4.3 Likely
CVE-2011-1937 2011-05-31 2025-04-11 - 4.3 Likely
CVE-2014-0339 2014-03-16 2025-04-12 - 4.3 Likely
CVE-2014-3924 2014-05-30 2025-04-12 - 4.3 Likely
CVE-2014-3883 2014-06-21 2025-04-12 - 6.8 Likely
CVE-2014-3884 2014-07-20 2025-04-12 - 4.3 Likely
CVE-2014-3885 2014-07-20 2025-04-12 - 4.3 Likely
CVE-2014-3886 2014-07-20 2025-04-12 - 2.6 Unknown
CVE-2015-1377 2015-02-10 2025-04-12 - 4.9 Unknown
CVE-2016-4897 2017-04-12 2025-04-20 6.1 4.3 Likely
CVE-2017-2106 2017-04-28 2025-04-20 6.1 4.3 Likely
CVE-2017-9313 2017-07-04 2025-04-20 6.1 4.3 Likely
CVE-2017-15644 2017-10-19 2025-04-20 8.6 5.0 Likely
CVE-2017-15645 2017-10-19 2025-04-20 8.8 6.8 Likely
CVE-2017-15646 2017-10-19 2025-04-20 6.1 4.3 Likely
CVE-2017-17089 2017-12-30 2025-04-20 4.8 3.5 Unknown
CVE-2018-8712 2018-03-14 2024-11-21 9.8 5.0 Likely
CVE-2019-9624 2019-03-07 2024-11-21 7.8 6.8 Likely
CVE-2018-19191 2019-03-21 2024-11-21 5.4 3.5 Unknown
CVE-2019-12840 2019-06-15 2024-11-21 8.8 9.0 Likely
CVE-2019-15107 2019-08-16 2025-11-06 9.8 10.0 Likely
CVE-2019-15641 2019-08-26 2024-11-21 6.5 6.8 Likely
CVE-2019-15642 2019-08-26 2024-11-21 8.8 6.5 Likely
CVE-2020-12670 2020-10-12 2024-11-21 6.1 4.3 Likely
CVE-2020-8820 2020-10-12 2024-11-21 5.4 3.5 Unknown
CVE-2020-8821 2020-10-12 2024-11-21 5.4 3.5 Unknown
CVE-2020-35606 2020-12-21 2024-11-21 8.8 9.0 Likely
CVE-2020-35769 2020-12-29 2024-11-21 9.8 7.5 Likely
CVE-2021-31760 2021-04-25 2024-11-21 8.8 6.8 Likely
CVE-2021-31761 2021-04-25 2024-11-21 9.6 6.8 Likely
CVE-2021-31762 2021-04-25 2024-11-21 8.8 6.8 Likely
CVE-2022-0824 2022-03-02 2024-11-21 8.8 9.0 Likely
CVE-2022-0829 2022-03-02 2024-11-21 8.1 5.5 Likely
CVE-2021-32156 2022-04-11 2024-11-21 8.8 6.8 Likely
CVE-2021-32157 2022-04-11 2024-11-21 9.6 6.8 Likely
CVE-2021-32158 2022-04-11 2024-11-21 6.1 4.3 Likely
CVE-2021-32159 2022-04-11 2024-11-21 8.8 6.8 Likely
CVE-2021-32160 2022-04-11 2024-11-21 6.1 4.3 Likely
CVE-2021-32161 2022-04-11 2024-11-21 6.1 4.3 Likely
CVE-2021-32162 2022-04-11 2024-11-21 8.8 6.8 Likely
CVE-2022-30708 2022-05-15 2024-11-21 8.8 6.5 Likely
CVE-2022-36446 2022-07-25 2024-11-21 9.8 - -
CVE-2022-36880 2022-07-27 2024-11-21 6.1 4.3 Likely
CVE-2022-35132 2022-10-25 2025-05-07 8.8 - -
CVE-2022-3844 2022-11-02 2024-11-21 3.5 4.0 Likely
CVE-2023-38303 2023-07-31 2024-11-21 5.4 - -
CVE-2023-38304 2023-07-31 2024-11-21 5.4 - -
CVE-2023-38305 2023-07-31 2024-11-21 6.1 - -
CVE-2023-38306 2023-07-31 2024-11-21 6.1 - -
CVE-2023-38307 2023-07-31 2024-11-21 5.4 - -
CVE-2023-38308 2023-07-31 2024-11-21 6.1 - -
CVE-2023-38309 2023-07-31 2024-11-21 6.1 - -
CVE-2023-38310 2023-07-31 2024-11-21 5.4 - -
CVE-2023-38311 2023-07-31 2024-11-21 5.4 - -
CVE-2023-41153 2023-08-29 2024-11-21 5.4 - -
CVE-2023-41163 2023-08-30 2024-11-21 6.1 - -
CVE-2023-41161 2023-09-07 2024-11-21 5.4 - -
CVE-2023-41152 2023-09-13 2024-11-21 5.4 - -
CVE-2023-41154 2023-09-13 2024-11-21 5.4 - -
CVE-2023-41155 2023-09-13 2024-11-21 5.4 - -
CVE-2023-41158 2023-09-13 2024-11-21 5.4 - -
CVE-2023-41162 2023-09-13 2024-11-21 6.1 - -
CVE-2023-41156 2023-09-14 2024-11-21 5.4 - -
CVE-2023-41159 2023-09-14 2024-11-21 5.4 - -
CVE-2023-41160 2023-09-14 2024-11-21 5.4 - -
CVE-2023-40984 2023-09-15 2024-11-21 5.4 - -
CVE-2023-40985 2023-09-15 2024-11-21 5.4 - -
CVE-2023-40986 2023-09-15 2024-11-21 5.4 - -
CVE-2023-40982 2023-09-15 2024-11-21 5.4 - -
CVE-2023-40983 2023-09-15 2024-11-21 6.1 - -
CVE-2023-41157 2023-09-16 2024-11-21 5.4 - -
CVE-2023-43309 2023-09-21 2024-11-21 4.8 - -
CVE-2023-52046 2024-01-25 2025-05-30 4.8 - -
CVE-2024-36450 2024-07-10 2025-03-13 5.4 - -
CVE-2024-36451 2024-07-10 2025-10-08 8.8 - -
CVE-2024-36452 2024-07-10 2025-10-08 3.1 - -
CVE-2024-36453 2024-07-10 2025-10-08 6.1 - -
CVE-2024-45692 2024-09-04 2024-09-05 7.5 - -
CVE-2024-44762 2024-10-16 2025-10-15 5.3 - -
CVE-2024-12828 2024-12-30 2025-08-14 8.8 - -
CVE-2015-2079 2025-04-28 2025-05-14 9.9 - -
CVE-2025-61541 2025-10-16 2025-11-06 7.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for webmin by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with webmin's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.