Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
gnutls Vendor: gnu

About This Product

gnutls is a software product offered by gnu. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 69 known vulnerabilities affecting gnu gnutls. This includes 5 critical-severity issues and 23 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2004 to 2025, indicating a sustained research interest and ongoing security attention. 41 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2004-2531 2004-12-31 2025-04-03 - 7.8 Likely
CVE-2005-1431 2005-05-03 2025-04-03 - 5.0 Likely
CVE-2006-4790 2006-09-14 2025-04-03 - 5.0 Likely
CVE-2008-1948 2008-05-21 2025-04-09 - 10.0 Likely
CVE-2008-1949 2008-05-21 2025-04-09 - 9.3 Likely
CVE-2008-1950 2008-05-21 2025-04-09 - 5.0 Likely
CVE-2008-2377 2008-08-08 2025-04-09 - 7.6 Unknown
CVE-2008-4989 2008-11-13 2025-04-09 5.9 4.3 Likely
CVE-2009-1415 2009-04-30 2025-04-09 - 4.3 Likely
CVE-2009-1416 2009-04-30 2025-04-09 - 7.5 Likely
CVE-2009-1417 2009-04-30 2025-04-09 - 5.0 Likely
CVE-2009-1390 2009-06-16 2025-04-09 - 6.8 Likely
CVE-2009-2409 2009-07-30 2025-04-09 - 5.1 Unknown
CVE-2009-2730 2009-08-12 2025-04-09 - 7.5 Likely
CVE-2009-3555 2009-11-09 2025-04-09 - 5.8 Likely
CVE-2010-0731 2010-03-26 2025-04-11 - 7.5 Likely
CVE-2006-7239 2010-05-24 2025-04-11 - 5.0 Likely
CVE-2011-4128 2011-12-08 2025-04-11 - 4.3 Likely
CVE-2012-0390 2012-01-06 2025-04-11 - 4.3 Likely
CVE-2012-1663 2012-03-13 2025-04-11 - 7.5 Likely
CVE-2012-1569 2012-03-26 2025-04-11 - 5.0 Likely
CVE-2012-1573 2012-03-26 2025-04-11 - 5.0 Likely
CVE-2013-1619 2013-02-08 2025-04-11 - 4.0 Unknown
CVE-2013-2116 2013-07-03 2025-04-11 - 5.0 Likely
CVE-2013-4466 2013-11-20 2025-04-11 - 5.0 Likely
CVE-2013-4487 2013-11-20 2025-04-11 - 5.0 Likely
CVE-2009-5138 2014-03-07 2025-04-12 - 5.8 Likely
CVE-2014-0092 2014-03-07 2025-04-12 - 5.8 Likely
CVE-2014-1959 2014-03-07 2025-04-12 - 5.8 Likely
CVE-2014-3466 2014-06-03 2025-04-12 - 6.8 Likely
CVE-2014-3467 2014-06-05 2025-04-12 - 5.0 Likely
CVE-2014-3468 2014-06-05 2025-04-12 - 7.5 Likely
CVE-2014-3469 2014-06-05 2025-04-12 - 5.0 Likely
CVE-2014-3465 2014-06-10 2025-04-12 - 5.0 Likely
CVE-2014-8564 2014-11-13 2025-04-12 - 5.0 Likely
CVE-2015-0282 2015-03-24 2025-04-12 - 5.0 Likely
CVE-2014-8155 2015-08-14 2025-04-12 - 4.3 Likely
CVE-2015-6251 2015-08-24 2025-04-12 - 5.0 Likely
CVE-2015-3308 2015-09-02 2025-04-12 - 7.5 Likely
CVE-2016-7444 2016-09-27 2025-04-12 7.5 5.0 Likely
CVE-2017-5334 2017-03-24 2025-04-20 9.8 7.5 Likely
CVE-2017-5335 2017-03-24 2025-04-20 7.5 5.0 Likely
CVE-2017-5336 2017-03-24 2025-04-20 9.8 7.5 Likely
CVE-2017-5337 2017-03-24 2025-04-20 9.8 7.5 Likely
CVE-2017-7869 2017-04-14 2025-04-20 7.5 5.0 Likely
CVE-2017-7507 2017-06-16 2025-04-20 7.5 5.0 Likely
CVE-2016-4456 2017-08-08 2025-04-20 7.5 5.0 Likely
CVE-2018-10844 2018-08-22 2024-11-21 5.9 4.3 Likely
CVE-2018-10845 2018-08-22 2024-11-21 5.9 4.3 Likely
CVE-2018-10846 2018-08-22 2024-11-21 5.6 1.9 Unknown
CVE-2018-16868 2018-12-03 2024-11-21 5.6 3.3 Unknown
CVE-2019-3829 2019-03-27 2024-11-21 5.3 5.0 Likely
CVE-2019-3836 2019-04-01 2024-11-21 5.9 5.0 Likely
CVE-2015-8313 2019-12-20 2024-11-21 5.9 4.3 Likely
CVE-2015-0294 2020-01-27 2024-11-21 7.5 5.0 Likely
CVE-2020-11501 2020-04-03 2024-11-21 7.4 5.8 Likely
CVE-2020-13777 2020-06-04 2024-11-21 7.4 5.8 Likely
CVE-2020-24659 2020-09-04 2024-11-21 7.5 5.0 Likely
CVE-2021-20231 2021-03-12 2024-11-21 9.8 7.5 Likely
CVE-2021-20232 2021-03-12 2025-12-03 9.8 7.5 Likely
CVE-2022-2509 2022-08-01 2025-12-02 7.5 - -
CVE-2021-4209 2022-08-24 2024-11-21 6.5 - -
CVE-2023-0361 2023-02-15 2025-03-19 7.4 - -
CVE-2023-5981 2023-11-28 2026-02-25 5.9 - -
CVE-2024-0553 2024-01-16 2026-02-25 7.5 - -
CVE-2024-0567 2024-01-16 2024-11-21 7.5 - -
CVE-2025-32988 2025-07-10 2025-12-01 6.5 - -
CVE-2025-32989 2025-07-10 2025-12-01 5.3 - -
CVE-2025-32990 2025-07-10 2025-12-01 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for gnu gnutls by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.