Known Vulnerabilities for Gst-plugins-bad by Freedesktop

Listed below are 1 of the newest known vulnerabilities associated with "Gst-plugins-bad" by "Freedesktop".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-35094 A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a... Not Provided 2026-04-01 2026-04-01
CVE-2026-34613 WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php a... Not Provided 2026-03-31 2026-04-01
CVE-2026-34394 WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's admin plugin configuration endpoint (admin... Not Provided 2026-03-31 2026-04-01
CVE-2026-34040 Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows a... Not Provided 2026-03-31 2026-03-31
CVE-2026-33997 Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows p... Not Provided 2026-03-31 2026-03-31
CVE-2026-33643 SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the mysqlColumnAsInsert function in file plugins... Not Provided 2026-03-30 2026-03-30
CVE-2026-32920 OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verific... Not Provided 2026-03-31 2026-03-31
CVE-2026-29953 SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the columnAsInsert function in file plugins/post... Not Provided 2026-03-30 2026-03-30
CVE-2026-5130 The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to a... Not Provided 2026-03-30 2026-03-31
CVE-2026-4020 The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2... Not Provided 2026-03-31 2026-03-31

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFreedesktopGst-plugins-bad1.9.90AllAllAll
ApplicationFreedesktopGst-plugins-bad1.9.2AllAllAll
ApplicationFreedesktopGst-plugins-bad1.9.1AllAllAll
ApplicationFreedesktopGst-plugins-bad1.8.3AllAllAll
ApplicationFreedesktopGst-plugins-bad1.8.2AllAllAll
ApplicationFreedesktopGst-plugins-bad1.8.1AllAllAll
ApplicationFreedesktopGst-plugins-bad1.8.0AllAllAll
ApplicationFreedesktopGst-plugins-bad1.7.91AllAllAll
ApplicationFreedesktopGst-plugins-bad1.7.90AllAllAll
ApplicationFreedesktopGst-plugins-bad1.7.2AllAllAll
ApplicationFreedesktopGst-plugins-bad1.7.1AllAllAll
ApplicationFreedesktopGst-plugins-bad1.6.4AllAllAll
ApplicationFreedesktopGst-plugins-bad1.6.3AllAllAll
ApplicationFreedesktopGst-plugins-bad1.6.2AllAllAll
ApplicationFreedesktopGst-plugins-bad1.6.1AllAllAll
ApplicationFreedesktopGst-plugins-bad1.6.0AllAllAll
ApplicationFreedesktopGst-plugins-bad1.5.91AllAllAll
ApplicationFreedesktopGst-plugins-bad1.5.90AllAllAll
ApplicationFreedesktopGst-plugins-bad1.5.2AllAllAll
ApplicationFreedesktopGst-plugins-bad1.5.1AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report