Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

gstreamer_project

About This Vendor

gstreamer_project is a technology vendor producing software and infrastructure products. As a software provider, gstreamer_project's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of gstreamer_project's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 81 known vulnerabilities from gstreamer_project. This includes 16 critical-severity issues and 54 high-severity issues that represent significant risk. These vulnerabilities affect 32 distinct products across gstreamer_project's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2025, indicating decades of continuous security attention and research. Organizations deploying gstreamer_project products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-0586 2009-03-14 2025-04-09 - 7.5 Likely
CVE-2015-0797 2015-05-14 2025-04-12 - 6.8 Likely
CVE-2016-9445 2017-01-23 2025-04-20 7.5 5.0 Likely
CVE-2016-9446 2017-01-23 2025-04-20 7.5 5.0 Likely
CVE-2016-9447 2017-01-23 2025-04-20 7.8 6.8 Likely
CVE-2016-10198 2017-02-09 2025-04-20 5.5 4.3 Likely
CVE-2016-10199 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5837 2017-02-09 2025-04-20 5.5 4.3 Likely
CVE-2017-5838 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5839 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5840 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5841 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5842 2017-02-09 2025-04-20 5.5 4.3 Likely
CVE-2017-5843 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5844 2017-02-09 2025-04-20 5.5 4.3 Likely
CVE-2017-5845 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5846 2017-02-09 2025-04-20 5.5 4.3 Likely
CVE-2017-5847 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2017-5848 2017-02-09 2025-04-20 7.5 5.0 Likely
CVE-2019-9928 2019-04-24 2024-11-21 8.8 6.8 Likely
CVE-2020-6095 2020-03-27 2024-11-21 7.5 5.0 Likely
CVE-2021-3497 2021-04-19 2024-11-21 7.8 6.8 Likely
CVE-2021-3498 2021-04-19 2024-11-21 7.8 6.8 Likely
CVE-2021-3522 2021-06-02 2024-11-21 5.5 4.3 Likely
CVE-2022-1920 2022-07-19 2024-11-21 7.8 - -
CVE-2022-1921 2022-07-19 2024-11-21 7.8 - -
CVE-2022-1922 2022-07-19 2024-11-21 7.8 - -
CVE-2022-1923 2022-07-19 2024-11-21 7.8 - -
CVE-2022-1924 2022-07-19 2024-11-21 7.8 - -
CVE-2022-1925 2022-07-19 2024-11-21 7.8 - -
CVE-2022-2122 2022-07-19 2024-11-21 7.8 - -
CVE-2023-37327 2024-05-03 2025-11-04 8.8 - -
CVE-2023-37328 2024-05-03 2025-11-04 8.8 - -
CVE-2023-37329 2024-05-03 2025-11-04 8.8 - -
CVE-2023-38103 2024-05-03 2024-12-17 8.8 - -
CVE-2023-38104 2024-05-03 2024-12-17 8.8 - -
CVE-2023-40474 2024-05-03 2025-11-04 8.8 - -
CVE-2023-40475 2024-05-03 2025-11-04 8.8 - -
CVE-2023-40476 2024-05-03 2025-11-04 8.8 - -
CVE-2023-44429 2024-05-03 2024-12-16 8.8 - -
CVE-2023-44446 2024-05-03 2025-11-04 8.8 - -
CVE-2023-50186 2024-05-03 2024-12-16 8.8 - -
CVE-2024-4453 2024-05-22 2024-12-17 7.8 - -
CVE-2024-0444 2024-06-07 2024-12-27 8.8 - -
CVE-2024-47537 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47538 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47539 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47540 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47541 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47542 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47543 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47544 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47545 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47546 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47596 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47597 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47598 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47599 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47600 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47601 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47602 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47603 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47606 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47607 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47613 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47615 2024-12-12 2025-11-03 9.8 - -
CVE-2024-47774 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47775 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47776 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47777 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47778 2024-12-12 2025-11-03 7.5 - -
CVE-2024-47834 2024-12-12 2025-11-03 9.1 - -
CVE-2024-47835 2024-12-12 2025-11-03 7.5 - -
CVE-2025-2759 2025-05-22 2025-08-13 7.8 - -
CVE-2025-3887 2025-05-22 2025-08-13 8.8 - -
CVE-2025-6663 2025-07-07 2025-08-14 7.8 - -
CVE-2025-47183 2025-08-07 2025-08-12 6.6 - -
CVE-2025-47219 2025-08-07 2025-08-12 8.1 - -
CVE-2025-47806 2025-08-07 2025-08-12 5.6 - -
CVE-2025-47807 2025-08-07 2025-08-12 5.5 - -
CVE-2025-47808 2025-08-07 2025-08-12 5.6 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for gstreamer_project by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with gstreamer_project's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.