Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

gstreamer

About This Vendor

gstreamer is a technology vendor producing software and infrastructure products. As a software provider, gstreamer's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of gstreamer's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 106 known vulnerabilities from gstreamer. This includes 19 critical-severity issues and 70 high-severity issues that represent significant risk. These vulnerabilities affect 33 distinct products across gstreamer's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2026, indicating decades of continuous security attention and research. Organizations deploying gstreamer products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-0386 2009-02-02 2025-04-09 - 9.3 Likely
CVE-2009-0387 2009-02-02 2025-04-09 - 9.3 Likely
CVE-2009-0397 2009-02-03 2025-04-09 - 9.3 Likely
CVE-2009-0398 2009-02-03 2025-04-09 - 9.3 Likely
CVE-2009-0586 2009-03-14 2026-03-17 - 7.5 Likely
CVE-2009-1932 2009-06-04 2025-04-09 - 6.8 Likely
CVE-2015-0797 2015-05-14 2026-03-17 - 6.8 Likely
CVE-2016-9807 2017-01-13 2025-04-20 5.5 4.3 Likely
CVE-2016-9808 2017-01-13 2025-04-20 7.5 5.0 Likely
CVE-2016-9809 2017-01-13 2025-04-20 7.8 6.8 Likely
CVE-2016-9810 2017-01-13 2025-04-20 5.5 4.3 Likely
CVE-2016-9811 2017-01-13 2025-04-20 4.7 4.3 Likely
CVE-2016-9812 2017-01-13 2025-04-20 7.5 5.0 Likely
CVE-2016-9813 2017-01-13 2025-04-20 5.5 4.3 Likely
CVE-2016-9445 2017-01-23 2026-03-17 7.5 5.0 Likely
CVE-2016-9446 2017-01-23 2026-03-17 7.5 5.0 Likely
CVE-2016-9447 2017-01-23 2026-03-17 7.8 6.8 Likely
CVE-2016-9634 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-9635 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-9636 2017-01-27 2025-04-20 9.8 7.5 Likely
CVE-2016-10198 2017-02-09 2026-03-17 5.5 4.3 Likely
CVE-2016-10199 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5837 2017-02-09 2026-03-17 5.5 4.3 Likely
CVE-2017-5838 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5839 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5840 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5841 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5842 2017-02-09 2026-03-17 5.5 4.3 Likely
CVE-2017-5843 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5844 2017-02-09 2026-03-17 5.5 4.3 Likely
CVE-2017-5845 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5846 2017-02-09 2026-03-17 5.5 4.3 Likely
CVE-2017-5847 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2017-5848 2017-02-09 2026-03-17 7.5 5.0 Likely
CVE-2019-9928 2019-04-24 2026-03-17 8.8 6.8 Likely
CVE-2021-3497 2021-04-19 2026-03-17 7.8 6.8 Likely
CVE-2021-3498 2021-04-19 2026-03-17 7.8 6.8 Likely
CVE-2021-3522 2021-06-02 2026-03-17 5.5 4.3 Likely
CVE-2022-1920 2022-07-19 2026-03-17 7.8 - -
CVE-2022-1921 2022-07-19 2026-03-17 7.8 - -
CVE-2022-1922 2022-07-19 2026-03-17 7.8 - -
CVE-2022-1923 2022-07-19 2026-03-17 7.8 - -
CVE-2022-1924 2022-07-19 2026-03-17 7.8 - -
CVE-2022-1925 2022-07-19 2026-03-17 7.8 - -
CVE-2022-2122 2022-07-19 2026-03-17 7.8 - -
CVE-2023-37327 2024-05-03 2026-03-17 8.8 - -
CVE-2023-37328 2024-05-03 2026-03-17 8.8 - -
CVE-2023-37329 2024-05-03 2026-03-17 8.8 - -
CVE-2023-38103 2024-05-03 2026-03-17 8.8 - -
CVE-2023-38104 2024-05-03 2026-03-17 8.8 - -
CVE-2023-40474 2024-05-03 2026-03-17 8.8 - -
CVE-2023-40475 2024-05-03 2026-03-17 8.8 - -
CVE-2023-40476 2024-05-03 2026-03-17 8.8 - -
CVE-2023-44429 2024-05-03 2026-03-17 8.8 - -
CVE-2023-44446 2024-05-03 2026-03-17 8.8 - -
CVE-2023-50186 2024-05-03 2026-03-17 8.8 - -
CVE-2024-4453 2024-05-22 2026-03-17 7.8 - -
CVE-2024-0444 2024-06-07 2026-03-17 8.8 - -
CVE-2024-40897 2024-07-26 2024-11-21 6.7 - -
CVE-2024-47537 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47538 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47539 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47540 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47541 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47542 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47543 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47544 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47545 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47546 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47596 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47597 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47598 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47599 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47600 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47601 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47602 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47603 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47606 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47607 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47613 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47615 2024-12-12 2026-03-17 9.8 - -
CVE-2024-47774 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47775 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47776 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47777 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47778 2024-12-12 2026-03-17 7.5 - -
CVE-2024-47834 2024-12-12 2026-03-17 9.1 - -
CVE-2024-47835 2024-12-12 2026-03-17 7.5 - -
CVE-2025-2759 2025-05-22 2026-03-17 7.8 - -
CVE-2025-3887 2025-05-22 2026-03-17 8.8 - -
CVE-2025-6663 2025-07-07 2026-03-17 7.8 - -
CVE-2025-47183 2025-08-07 2026-03-17 6.6 - -
CVE-2025-47219 2025-08-07 2026-03-17 8.1 - -
CVE-2025-47806 2025-08-07 2026-03-17 5.6 - -
CVE-2025-47807 2025-08-07 2026-03-17 5.5 - -
CVE-2025-47808 2025-08-07 2026-03-17 5.6 - -
CVE-2026-2920 2026-03-16 2026-03-17 7.8 - -
CVE-2026-2921 2026-03-16 2026-03-17 7.8 - -
CVE-2026-2922 2026-03-16 2026-03-17 7.8 - -
CVE-2026-2923 2026-03-16 2026-03-17 7.8 - -
CVE-2026-3081 2026-03-16 2026-03-17 7.8 - -
CVE-2026-3082 2026-03-16 2026-03-17 7.8 - -
CVE-2026-3083 2026-03-16 2026-03-17 8.8 - -
CVE-2026-3084 2026-03-16 2026-03-17 7.8 - -
CVE-2026-3085 2026-03-16 2026-03-17 8.8 - -
CVE-2026-3086 2026-03-16 2026-03-17 7.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for gstreamer by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with gstreamer's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.