Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

libav

About This Vendor

libav is a technology vendor producing software and infrastructure products. As a software provider, libav's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of libav's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 108 known vulnerabilities from libav. This includes 1 critical-severity issue and 40 high-severity issues that represent significant risk. These vulnerabilities affect 10 distinct products across libav's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2011 through 2025, indicating decades of continuous security attention and research. Organizations deploying libav products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2011-1931 2011-07-07 2025-04-11 - 6.8 Likely
CVE-2011-3362 2011-10-02 2025-04-11 - 6.8 Likely
CVE-2011-3929 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-3936 2012-08-20 2025-04-11 - 4.3 Likely
CVE-2011-3940 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-3947 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-3951 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-3952 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2012-0851 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2012-0852 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2012-0853 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2012-0858 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2012-0947 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-3945 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-4352 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-4353 2012-08-20 2025-04-11 - 4.3 Likely
CVE-2011-4364 2012-08-20 2025-04-11 - 6.8 Likely
CVE-2011-4579 2012-08-20 2025-04-11 - 4.3 Likely
CVE-2012-2772 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2775 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2776 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2777 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2779 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2783 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2784 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2786 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2787 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2788 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2789 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2790 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2791 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2793 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2794 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2796 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2797 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2798 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2800 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2801 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2802 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2803 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-2804 2012-09-10 2025-04-11 - 10.0 Likely
CVE-2012-5144 2012-12-12 2025-04-11 - 10.0 Likely
CVE-2011-3937 2013-01-05 2025-04-11 - 10.0 Likely
CVE-2014-3984 2014-06-06 2025-04-12 - 10.0 Likely
CVE-2014-5271 2014-11-03 2025-04-12 - 7.5 Likely
CVE-2015-3395 2015-06-16 2025-04-12 - 6.8 Likely
CVE-2015-5479 2016-04-19 2025-04-12 6.5 4.3 Likely
CVE-2016-3062 2016-06-16 2025-04-12 8.8 6.8 Likely
CVE-2016-7424 2016-10-07 2025-04-12 5.5 4.3 Likely
CVE-2016-6832 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-7393 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-7477 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-7499 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-8675 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-8676 2017-02-15 2025-04-20 5.5 4.3 Likely
CVE-2016-9819 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9820 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9821 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9822 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9823 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9824 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9825 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2016-9826 2017-03-01 2025-04-20 5.5 4.3 Likely
CVE-2017-7206 2017-03-21 2025-04-20 7.1 5.8 Likely
CVE-2017-7208 2017-03-21 2025-04-20 7.1 5.8 Likely
CVE-2017-9051 2017-05-18 2025-04-20 9.8 7.5 Likely
CVE-2017-9987 2017-06-28 2025-04-20 7.5 5.0 Likely
CVE-2017-11684 2017-07-27 2025-04-20 7.5 5.0 Likely
CVE-2017-16803 2017-11-13 2025-04-20 7.5 5.0 Likely
CVE-2017-17127 2017-12-04 2025-04-20 6.5 4.3 Likely
CVE-2017-17128 2017-12-04 2025-04-20 6.5 4.3 Likely
CVE-2017-17129 2017-12-04 2025-04-20 8.8 6.8 Likely
CVE-2017-17130 2017-12-04 2025-04-20 8.8 6.8 Likely
CVE-2017-1000460 2018-01-03 2024-11-21 6.5 4.3 Likely
CVE-2018-5684 2018-01-14 2024-11-21 8.8 6.8 Likely
CVE-2018-5766 2018-01-18 2024-11-21 8.8 6.8 Likely
CVE-2017-18242 2018-03-22 2024-11-21 6.5 4.3 Likely
CVE-2017-18243 2018-03-22 2024-11-21 6.5 4.3 Likely
CVE-2017-18244 2018-03-22 2024-11-21 6.5 4.3 Likely
CVE-2017-18245 2018-03-23 2024-11-21 6.5 4.3 Likely
CVE-2017-18246 2018-03-23 2024-11-21 6.5 4.3 Likely
CVE-2017-18247 2018-03-23 2024-11-21 6.5 4.3 Likely
CVE-2018-11102 2018-05-15 2024-11-21 7.5 5.0 Likely
CVE-2018-11224 2018-05-17 2024-11-21 6.5 4.3 Likely
CVE-2018-18826 2018-10-30 2024-11-21 6.5 4.3 Likely
CVE-2018-18827 2018-10-30 2024-11-21 6.5 4.3 Likely
CVE-2018-18828 2018-10-30 2024-11-21 6.5 4.3 Likely
CVE-2018-18829 2018-10-30 2024-11-21 6.5 4.3 Likely
CVE-2018-19128 2018-11-09 2024-11-21 6.5 4.3 Likely
CVE-2018-19129 2018-11-09 2024-11-21 6.5 4.3 Likely
CVE-2018-19130 2018-11-09 2024-11-21 6.5 4.3 Likely
CVE-2018-20001 2018-12-10 2024-11-21 6.5 4.3 Likely
CVE-2017-5984 2019-05-22 2024-11-21 6.5 4.3 Likely
CVE-2019-14371 2019-07-28 2024-11-21 6.5 4.3 Likely
CVE-2019-14372 2019-07-28 2024-11-21 6.5 4.3 Likely
CVE-2019-14441 2019-07-30 2024-11-21 6.5 4.3 Likely
CVE-2019-14442 2019-07-30 2024-11-21 6.5 7.1 Likely
CVE-2019-14443 2019-07-30 2024-11-21 6.5 4.3 Likely
CVE-2019-9717 2019-09-19 2024-11-21 6.5 7.1 Likely
CVE-2019-9719 2019-09-19 2024-11-21 8.8 6.8 Likely
CVE-2019-9720 2019-09-19 2024-11-21 6.5 7.1 Likely
CVE-2014-4609 2020-01-14 2024-11-21 8.8 6.8 Likely
CVE-2020-18775 2021-08-23 2024-11-21 6.5 4.3 Likely
CVE-2020-18776 2021-08-23 2024-11-21 6.5 4.3 Likely
CVE-2020-18778 2021-08-23 2024-11-21 6.5 4.3 Likely
CVE-2025-8584 2025-08-05 2025-09-04 3.3 1.7 Unknown
CVE-2025-8585 2025-08-05 2025-09-04 5.3 4.3 Unknown
CVE-2025-8586 2025-08-05 2025-09-04 3.3 1.7 Unknown

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for libav by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with libav's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.