Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
libredwg Vendor: gnu

About This Product

libredwg is a software product offered by gnu. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 87 known vulnerabilities affecting gnu libredwg. This includes 5 critical-severity issues and 60 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2024, indicating a sustained research interest and ongoing security attention. 22 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-14443 2018-07-20 2024-11-21 6.5 4.3 Likely
CVE-2018-14471 2018-07-20 2024-11-21 6.5 4.3 Likely
CVE-2018-14524 2018-07-23 2024-11-21 6.5 4.3 Likely
CVE-2019-9770 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9771 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9772 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9773 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9774 2019-03-14 2024-11-21 9.1 6.4 Likely
CVE-2019-9775 2019-03-14 2024-11-21 9.1 6.4 Likely
CVE-2019-9776 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9777 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9778 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-9779 2019-03-14 2024-11-21 7.5 5.0 Likely
CVE-2019-20009 2019-12-27 2024-11-21 6.5 4.3 Likely
CVE-2019-20010 2019-12-27 2024-11-21 8.8 6.8 Likely
CVE-2019-20011 2019-12-27 2024-11-21 8.8 6.8 Likely
CVE-2019-20012 2019-12-27 2024-11-21 6.5 4.3 Likely
CVE-2019-20013 2019-12-27 2024-11-21 6.5 4.3 Likely
CVE-2019-20014 2019-12-27 2024-11-21 8.8 6.8 Likely
CVE-2019-20015 2019-12-27 2024-11-21 6.5 4.3 Likely
CVE-2020-6609 2020-01-08 2024-11-21 8.8 6.8 Likely
CVE-2020-6610 2020-01-08 2024-11-21 6.5 4.3 Likely
CVE-2020-6611 2020-01-08 2024-11-21 6.5 4.3 Likely
CVE-2020-6612 2020-01-08 2024-11-21 8.1 5.8 Likely
CVE-2020-6613 2020-01-08 2024-11-21 8.1 5.8 Likely
CVE-2020-6614 2020-01-08 2024-11-21 8.1 5.8 Likely
CVE-2020-6615 2020-01-08 2024-11-21 6.5 4.3 Likely
CVE-2019-20909 2020-07-16 2024-11-21 7.5 5.0 Likely
CVE-2019-20910 2020-07-16 2024-11-21 8.1 5.8 Likely
CVE-2019-20911 2020-07-16 2024-11-21 6.5 4.3 Likely
CVE-2019-20912 2020-07-16 2024-11-21 8.8 6.8 Likely
CVE-2019-20913 2020-07-16 2024-11-21 8.1 5.8 Likely
CVE-2019-20914 2020-07-16 2024-11-21 9.8 7.5 Likely
CVE-2019-20915 2020-07-16 2024-11-21 8.1 5.8 Likely
CVE-2020-15807 2020-07-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21813 2021-05-17 2024-11-21 7.8 6.8 Likely
CVE-2020-21814 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21815 2021-05-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21816 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21817 2021-05-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21818 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21819 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21827 2021-05-17 2024-11-21 7.8 6.8 Likely
CVE-2020-21830 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21832 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21833 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21834 2021-05-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21835 2021-05-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21836 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21838 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21839 2021-05-17 2024-11-21 6.5 4.3 Likely
CVE-2020-21840 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21841 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21831 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21842 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21843 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-21844 2021-05-17 2024-11-21 8.8 6.8 Likely
CVE-2020-23861 2021-05-18 2024-11-21 5.5 4.3 Likely
CVE-2021-36080 2021-07-01 2024-11-21 8.8 6.8 Likely
CVE-2021-39521 2021-09-20 2024-11-21 6.5 4.3 Likely
CVE-2021-39522 2021-09-20 2024-11-21 8.8 6.8 Likely
CVE-2021-39523 2021-09-20 2024-11-21 6.5 4.3 Likely
CVE-2021-39525 2021-09-20 2024-11-21 8.8 6.8 Likely
CVE-2021-39527 2021-09-20 2024-11-21 8.8 6.8 Likely
CVE-2021-39528 2021-09-20 2024-11-21 8.8 6.8 Likely
CVE-2021-39530 2021-09-20 2024-11-21 8.8 6.8 Likely
CVE-2021-28236 2021-12-02 2024-11-21 7.5 5.0 Likely
CVE-2021-28237 2021-12-02 2024-11-21 9.8 7.5 Likely
CVE-2021-45950 2022-01-01 2024-11-21 6.5 4.3 Likely
CVE-2021-42585 2022-05-23 2024-11-21 8.8 6.8 Likely
CVE-2021-42586 2022-05-23 2024-11-21 8.8 6.8 Likely
CVE-2022-33024 2022-06-23 2024-11-21 7.5 5.0 Likely
CVE-2022-33025 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33026 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33027 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33028 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33032 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33033 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-33034 2022-06-23 2024-11-21 7.8 6.8 Likely
CVE-2022-35164 2022-08-18 2024-11-21 9.8 - -
CVE-2022-45332 2022-11-30 2025-04-24 7.8 - -
CVE-2023-25222 2023-03-01 2024-11-21 8.8 - -
CVE-2023-36271 2023-06-23 2025-03-14 8.8 - -
CVE-2023-36272 2023-06-23 2025-04-08 8.8 - -
CVE-2023-36273 2023-06-23 2024-11-21 8.8 - -
CVE-2023-36274 2023-06-23 2025-03-14 8.8 - -
CVE-2023-26157 2024-01-02 2024-11-21 5.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for gnu libredwg by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.