Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libsoup2.4@2.30.2-1%2Bsqueeze1
Typedeb
Namespacedebian
Namelibsoup2.4
Version2.30.2-1+squeeze1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-24tr-cene-gfch
vulnerability_id VCID-24tr-cene-gfch
summary libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69774
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69864
published_at 2026-04-16T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69874
published_at 2026-04-18T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69856
published_at 2026-04-21T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69789
published_at 2026-04-04T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69765
published_at 2026-04-07T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69814
published_at 2026-04-08T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69829
published_at 2026-04-09T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69852
published_at 2026-04-11T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69837
published_at 2026-04-12T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69822
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
reference_id 2359355
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32911
reference_id CVE-2025-32911
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/security/cve/CVE-2025-32911
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32911
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24tr-cene-gfch
1
url VCID-2fpq-q21y-83a7
vulnerability_id VCID-2fpq-q21y-83a7
summary
A vulnerability in libsoup might allow remote attackers to execute
    arbitrary code.
references
0
reference_url http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2885.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2885.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2885
reference_id
reference_type
scores
0
value 0.08547
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-01T12:55:00Z
1
value 0.08547
scoring_system epss
scoring_elements 0.92412
published_at 2026-04-21T12:55:00Z
2
value 0.08547
scoring_system epss
scoring_elements 0.92377
published_at 2026-04-07T12:55:00Z
3
value 0.08547
scoring_system epss
scoring_elements 0.92388
published_at 2026-04-08T12:55:00Z
4
value 0.08547
scoring_system epss
scoring_elements 0.92393
published_at 2026-04-09T12:55:00Z
5
value 0.08547
scoring_system epss
scoring_elements 0.92399
published_at 2026-04-13T12:55:00Z
6
value 0.08547
scoring_system epss
scoring_elements 0.92401
published_at 2026-04-12T12:55:00Z
7
value 0.08547
scoring_system epss
scoring_elements 0.9241
published_at 2026-04-18T12:55:00Z
8
value 0.08547
scoring_system epss
scoring_elements 0.92366
published_at 2026-04-02T12:55:00Z
9
value 0.08547
scoring_system epss
scoring_elements 0.92373
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2885
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
4
reference_url http://seclists.org/fulldisclosure/2020/Dec/3
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2020/Dec/3
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.debian.org/security/2017/dsa-3929
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3929
7
reference_url https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392
reference_id
reference_type
scores
url https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392
8
reference_url http://www.securityfocus.com/bid/100258
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100258
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479281
reference_id 1479281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479281
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871650
reference_id 871650
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871650
11
reference_url https://security.archlinux.org/ASA-201708-5
reference_id ASA-201708-5
reference_type
scores
url https://security.archlinux.org/ASA-201708-5
12
reference_url https://security.archlinux.org/AVG-376
reference_id AVG-376
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-376
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-2885
reference_id CVE-2017-2885
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-2885
24
reference_url https://security.gentoo.org/glsa/201709-26
reference_id GLSA-201709-26
reference_type
scores
url https://security.gentoo.org/glsa/201709-26
25
reference_url https://access.redhat.com/errata/RHSA-2017:2459
reference_id RHSA-2017:2459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2459
26
reference_url https://usn.ubuntu.com/3383-1/
reference_id USN-3383-1
reference_type
scores
url https://usn.ubuntu.com/3383-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.48.0-1%2Bdeb8u1
purl pkg:deb/debian/libsoup2.4@2.48.0-1%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.48.0-1%252Bdeb8u1
1
url pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
purl pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.56.0-2%252Bdeb9u2
2
url pkg:deb/debian/libsoup2.4@2.64.2-2
purl pkg:deb/debian/libsoup2.4@2.64.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-fwhq-2jj5-wka3
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.64.2-2
aliases CVE-2017-2885
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fpq-q21y-83a7
2
url VCID-4m39-v7d7-1ba7
vulnerability_id VCID-4m39-v7d7-1ba7
summary libsoup: Integer overflow in append_param_quoted
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75417
published_at 2026-04-21T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.7542
published_at 2026-04-16T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75427
published_at 2026-04-18T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75327
published_at 2026-04-02T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75359
published_at 2026-04-04T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75392
published_at 2026-04-09T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75379
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
reference_id 1102212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
reference_id 2357067
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32050
reference_id CVE-2025-32050
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/security/cve/CVE-2025-32050
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32050
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m39-v7d7-1ba7
3
url VCID-6skx-v6sg-53gq
vulnerability_id VCID-6skx-v6sg-53gq
summary libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
reference_id
reference_type
scores
0
value 0.02145
scoring_system epss
scoring_elements 0.84169
published_at 2026-04-02T12:55:00Z
1
value 0.02145
scoring_system epss
scoring_elements 0.84228
published_at 2026-04-12T12:55:00Z
2
value 0.02145
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-13T12:55:00Z
3
value 0.02145
scoring_system epss
scoring_elements 0.84246
published_at 2026-04-16T12:55:00Z
4
value 0.02145
scoring_system epss
scoring_elements 0.84247
published_at 2026-04-18T12:55:00Z
5
value 0.02145
scoring_system epss
scoring_elements 0.84251
published_at 2026-04-21T12:55:00Z
6
value 0.02145
scoring_system epss
scoring_elements 0.84187
published_at 2026-04-04T12:55:00Z
7
value 0.02145
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-07T12:55:00Z
8
value 0.02145
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-08T12:55:00Z
9
value 0.02145
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-09T12:55:00Z
10
value 0.02145
scoring_system epss
scoring_elements 0.84234
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
reference_id 1102208
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
reference_id 2354669
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
reference_id 422
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-2784
reference_id CVE-2025-2784
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/security/cve/CVE-2025-2784
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:7505
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:9179
41
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
42
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-2784
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6skx-v6sg-53gq
4
url VCID-7hhg-3u9v-nqfw
vulnerability_id VCID-7hhg-3u9v-nqfw
summary libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52803
published_at 2026-04-02T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52877
published_at 2026-04-12T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-13T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-04-16T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52905
published_at 2026-04-18T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52889
published_at 2026-04-21T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.5283
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52797
published_at 2026-04-07T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52849
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-09T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52893
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
reference_id 1106205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
reference_id 1106375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
reference_id 2367175
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
reference_id 448
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-4945
reference_id CVE-2025-4945
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/security/cve/CVE-2025-4945
33
reference_url https://access.redhat.com/errata/RHSA-2025:19713
reference_id RHSA-2025:19713
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19713
34
reference_url https://access.redhat.com/errata/RHSA-2025:19714
reference_id RHSA-2025:19714
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19714
35
reference_url https://access.redhat.com/errata/RHSA-2025:19720
reference_id RHSA-2025:19720
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19720
36
reference_url https://access.redhat.com/errata/RHSA-2025:20959
reference_id RHSA-2025:20959
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:20959
37
reference_url https://access.redhat.com/errata/RHSA-2025:21032
reference_id RHSA-2025:21032
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21032
38
reference_url https://access.redhat.com/errata/RHSA-2025:21655
reference_id RHSA-2025:21655
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21655
39
reference_url https://access.redhat.com/errata/RHSA-2025:21656
reference_id RHSA-2025:21656
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21656
40
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21657
41
reference_url https://access.redhat.com/errata/RHSA-2025:21664
reference_id RHSA-2025:21664
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21664
42
reference_url https://access.redhat.com/errata/RHSA-2025:21665
reference_id RHSA-2025:21665
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21665
43
reference_url https://access.redhat.com/errata/RHSA-2025:21666
reference_id RHSA-2025:21666
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21666
44
reference_url https://access.redhat.com/errata/RHSA-2025:21772
reference_id RHSA-2025:21772
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21772
45
reference_url https://access.redhat.com/errata/RHSA-2025:22013
reference_id RHSA-2025:22013
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:22013
46
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4945
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hhg-3u9v-nqfw
5
url VCID-9uua-rxjd-fkf6
vulnerability_id VCID-9uua-rxjd-fkf6
summary libsoup: Off-by-One Out-of-Bounds Read in find_boundary() in soup-multipart.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68558
published_at 2026-04-21T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68481
published_at 2026-04-02T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68528
published_at 2026-04-13T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68568
published_at 2026-04-16T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68581
published_at 2026-04-18T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.685
published_at 2026-04-04T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-07T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-08T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68545
published_at 2026-04-09T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68571
published_at 2026-04-11T12:55:00Z
10
value 0.00568
scoring_system epss
scoring_elements 0.68559
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
reference_id 1106248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
reference_id 1106325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
reference_id 2367552
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4969
reference_id CVE-2025-4969
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://access.redhat.com/security/cve/CVE-2025-4969
13
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4969
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uua-rxjd-fkf6
6
url VCID-9vuw-57ex-k7ez
vulnerability_id VCID-9vuw-57ex-k7ez
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
1
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
2
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
reference_id
reference_type
scores
0
value 0.04219
scoring_system epss
scoring_elements 0.88773
published_at 2026-04-21T12:55:00Z
1
value 0.04219
scoring_system epss
scoring_elements 0.88764
published_at 2026-04-13T12:55:00Z
2
value 0.04219
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-16T12:55:00Z
3
value 0.04219
scoring_system epss
scoring_elements 0.88775
published_at 2026-04-18T12:55:00Z
4
value 0.07838
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-02T12:55:00Z
5
value 0.07838
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-04T12:55:00Z
6
value 0.07838
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-07T12:55:00Z
7
value 0.07838
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-08T12:55:00Z
8
value 0.07838
scoring_system epss
scoring_elements 0.91991
published_at 2026-04-09T12:55:00Z
9
value 0.07838
scoring_system epss
scoring_elements 0.91994
published_at 2026-04-12T12:55:00Z
10
value 0.07838
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
9
reference_url https://gitlab.gnome.org/GNOME/libsoup/issues/3
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/issues/3
10
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
12
reference_url https://www.debian.org/security/2018/dsa-4241
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4241
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
reference_id 1597980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
reference_id CVE-2018-12910
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
28
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
29
reference_url https://usn.ubuntu.com/3701-1/
reference_id USN-3701-1
reference_type
scores
url https://usn.ubuntu.com/3701-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
purl pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.56.0-2%252Bdeb9u2
1
url pkg:deb/debian/libsoup2.4@2.64.2-2
purl pkg:deb/debian/libsoup2.4@2.64.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-fwhq-2jj5-wka3
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.64.2-2
aliases CVE-2018-12910
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vuw-57ex-k7ez
7
url VCID-athp-xk5g-jbhu
vulnerability_id VCID-athp-xk5g-jbhu
summary libsoup: NULL Pointer Dereference on libsoup through function "sniff_mp4" in soup-content-sniffer.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66916
published_at 2026-04-04T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-12T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66926
published_at 2026-04-13T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-16T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66973
published_at 2026-04-18T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66938
published_at 2026-04-08T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-09T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66971
published_at 2026-04-11T12:55:00Z
9
value 0.00628
scoring_system epss
scoring_elements 0.70268
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
reference_id 1103517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
reference_id 2359353
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32909
reference_id CVE-2025-32909
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/security/cve/CVE-2025-32909
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32909
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-athp-xk5g-jbhu
8
url VCID-f481-8mb7-dbed
vulnerability_id VCID-f481-8mb7-dbed
summary libsoup: Null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.64141
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
reference_id 2359354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32910
reference_id CVE-2025-32910
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/security/cve/CVE-2025-32910
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32910
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f481-8mb7-dbed
9
url VCID-fwhq-2jj5-wka3
vulnerability_id VCID-fwhq-2jj5-wka3
summary libsoup: heap-based over-read in soup_ntlm_parse_challenge() in soup-auth-ntlm.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17266.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17266
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76218
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76308
published_at 2026-04-21T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-16T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.76324
published_at 2026-04-18T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76221
published_at 2026-04-02T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76253
published_at 2026-04-04T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76233
published_at 2026-04-07T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76265
published_at 2026-04-08T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-09T12:55:00Z
9
value 0.00942
scoring_system epss
scoring_elements 0.76305
published_at 2026-04-11T12:55:00Z
10
value 0.00942
scoring_system epss
scoring_elements 0.76283
published_at 2026-04-12T12:55:00Z
11
value 0.00942
scoring_system epss
scoring_elements 0.76278
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17266
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17266
4
reference_url https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md
reference_id
reference_type
scores
url https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/issues/173
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/issues/173
8
reference_url https://security-tracker.debian.org/tracker/CVE-2019-17266
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2019-17266
9
reference_url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
reference_id
reference_type
scores
url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1771292
reference_id 1771292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1771292
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17266
reference_id CVE-2019-17266
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17266
15
reference_url https://usn.ubuntu.com/4152-1/
reference_id USN-4152-1
reference_type
scores
url https://usn.ubuntu.com/4152-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.72.0-2
purl pkg:deb/debian/libsoup2.4@2.72.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2
aliases CVE-2019-17266
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwhq-2jj5-wka3
10
url VCID-k9bu-zasm-vfgr
vulnerability_id VCID-k9bu-zasm-vfgr
summary libsoup: NULL pointer dereference in client when server omits the "nonce" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.64141
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
reference_id 2359356
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-32912
reference_id CVE-2025-32912
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/security/cve/CVE-2025-32912
12
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/errata/RHSA-2025:7505
13
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
14
reference_url https://usn.ubuntu.com/7490-2/
reference_id USN-7490-2
reference_type
scores
url https://usn.ubuntu.com/7490-2/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32912
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9bu-zasm-vfgr
11
url VCID-ku6w-4wsv-qbe4
vulnerability_id VCID-ku6w-4wsv-qbe4
summary libsoup: Out of bounds reads in soup_headers_parse_request()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
reference_id
reference_type
scores
0
value 0.00795
scoring_system epss
scoring_elements 0.74012
published_at 2026-04-21T12:55:00Z
1
value 0.00795
scoring_system epss
scoring_elements 0.73929
published_at 2026-04-02T12:55:00Z
2
value 0.00795
scoring_system epss
scoring_elements 0.73971
published_at 2026-04-13T12:55:00Z
3
value 0.00795
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-16T12:55:00Z
4
value 0.00795
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-18T12:55:00Z
5
value 0.00795
scoring_system epss
scoring_elements 0.73954
published_at 2026-04-04T12:55:00Z
6
value 0.00795
scoring_system epss
scoring_elements 0.73926
published_at 2026-04-07T12:55:00Z
7
value 0.00795
scoring_system epss
scoring_elements 0.7396
published_at 2026-04-08T12:55:00Z
8
value 0.00795
scoring_system epss
scoring_elements 0.73974
published_at 2026-04-09T12:55:00Z
9
value 0.00795
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-11T12:55:00Z
10
value 0.00795
scoring_system epss
scoring_elements 0.73979
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
reference_id 1103521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
reference_id 2359341
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32906
reference_id CVE-2025-32906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/security/cve/CVE-2025-32906
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7505
44
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:8292
45
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:9179
46
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
47
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32906
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku6w-4wsv-qbe4
12
url VCID-qfjx-uc2n-3yde
vulnerability_id VCID-qfjx-uc2n-3yde
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2012. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2524.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2524
reference_id
reference_type
scores
0
value 0.00602
scoring_system epss
scoring_elements 0.69452
published_at 2026-04-01T12:55:00Z
1
value 0.00602
scoring_system epss
scoring_elements 0.69463
published_at 2026-04-02T12:55:00Z
2
value 0.00602
scoring_system epss
scoring_elements 0.69479
published_at 2026-04-04T12:55:00Z
3
value 0.00602
scoring_system epss
scoring_elements 0.69459
published_at 2026-04-07T12:55:00Z
4
value 0.00602
scoring_system epss
scoring_elements 0.6951
published_at 2026-04-08T12:55:00Z
5
value 0.00602
scoring_system epss
scoring_elements 0.69526
published_at 2026-04-09T12:55:00Z
6
value 0.00602
scoring_system epss
scoring_elements 0.69548
published_at 2026-04-21T12:55:00Z
7
value 0.00602
scoring_system epss
scoring_elements 0.69532
published_at 2026-04-12T12:55:00Z
8
value 0.00602
scoring_system epss
scoring_elements 0.69518
published_at 2026-04-13T12:55:00Z
9
value 0.00602
scoring_system epss
scoring_elements 0.69558
published_at 2026-04-16T12:55:00Z
10
value 0.00602
scoring_system epss
scoring_elements 0.69567
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635837
reference_id 635837
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635837
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=720509
reference_id 720509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=720509
5
reference_url https://security.gentoo.org/glsa/201412-09
reference_id GLSA-201412-09
reference_type
scores
url https://security.gentoo.org/glsa/201412-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1102
reference_id RHSA-2011:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1102
7
reference_url https://usn.ubuntu.com/1181-1/
reference_id USN-1181-1
reference_type
scores
url https://usn.ubuntu.com/1181-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.38.1-3
purl pkg:deb/debian/libsoup2.4@2.38.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.38.1-3
aliases CVE-2011-2524
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfjx-uc2n-3yde
13
url VCID-rd74-1427-eybf
vulnerability_id VCID-rd74-1427-eybf
summary libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
reference_id
reference_type
scores
0
value 0.00986
scoring_system epss
scoring_elements 0.76778
published_at 2026-04-02T12:55:00Z
1
value 0.00986
scoring_system epss
scoring_elements 0.76837
published_at 2026-04-12T12:55:00Z
2
value 0.00986
scoring_system epss
scoring_elements 0.76831
published_at 2026-04-13T12:55:00Z
3
value 0.00986
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-16T12:55:00Z
4
value 0.00986
scoring_system epss
scoring_elements 0.7688
published_at 2026-04-18T12:55:00Z
5
value 0.00986
scoring_system epss
scoring_elements 0.76871
published_at 2026-04-21T12:55:00Z
6
value 0.00986
scoring_system epss
scoring_elements 0.76807
published_at 2026-04-04T12:55:00Z
7
value 0.00986
scoring_system epss
scoring_elements 0.76787
published_at 2026-04-07T12:55:00Z
8
value 0.00986
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-08T12:55:00Z
9
value 0.00986
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-09T12:55:00Z
10
value 0.00986
scoring_system epss
scoring_elements 0.76858
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
reference_id 1106204
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
reference_id 1106337
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
reference_id 2367183
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
reference_id 449
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
29
reference_url https://access.redhat.com/security/cve/CVE-2025-4948
reference_id CVE-2025-4948
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/security/cve/CVE-2025-4948
30
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:21657
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8128
reference_id RHSA-2025:8128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8128
33
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8132
34
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8139
35
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8140
36
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8252
37
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8480
38
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8481
39
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8482
40
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8663
41
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:9179
42
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4948
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rd74-1427-eybf
14
url VCID-sabm-gujq-j3fb
vulnerability_id VCID-sabm-gujq-j3fb
summary libsoup: Null pointer dereference in libsoup may lead to Denial Of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49611
published_at 2026-04-21T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49578
published_at 2026-04-02T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49596
published_at 2026-04-13T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49643
published_at 2026-04-16T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49641
published_at 2026-04-18T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49605
published_at 2026-04-04T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49557
published_at 2026-04-07T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49612
published_at 2026-04-08T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49606
published_at 2026-04-09T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49623
published_at 2026-04-11T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49594
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
reference_id 1105887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
reference_id 1107757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
reference_id 2366513
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4476
reference_id CVE-2025-4476
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://access.redhat.com/security/cve/CVE-2025-4476
13
reference_url https://usn.ubuntu.com/7543-1/
reference_id USN-7543-1
reference_type
scores
url https://usn.ubuntu.com/7543-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sabm-gujq-j3fb
15
url VCID-svba-hf1d-y7ez
vulnerability_id VCID-svba-hf1d-y7ez
summary libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58632
published_at 2026-04-21T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.58581
published_at 2026-04-07T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58633
published_at 2026-04-08T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.5864
published_at 2026-04-09T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.58656
published_at 2026-04-18T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58637
published_at 2026-04-12T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58617
published_at 2026-04-13T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58651
published_at 2026-04-16T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.5859
published_at 2026-04-02T12:55:00Z
9
value 0.00366
scoring_system epss
scoring_elements 0.58611
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
reference_id 1088812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
reference_id 2325284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
reference_id 377
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
reference_id 402
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
8
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
9
reference_url https://access.redhat.com/errata/RHSA-2024:9501
reference_id RHSA-2024:9501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9501
10
reference_url https://access.redhat.com/errata/RHSA-2024:9524
reference_id RHSA-2024:9524
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9524
11
reference_url https://access.redhat.com/errata/RHSA-2024:9525
reference_id RHSA-2024:9525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9525
12
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
13
reference_url https://access.redhat.com/errata/RHSA-2024:9566
reference_id RHSA-2024:9566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9566
14
reference_url https://access.redhat.com/errata/RHSA-2024:9570
reference_id RHSA-2024:9570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9570
15
reference_url https://access.redhat.com/errata/RHSA-2024:9572
reference_id RHSA-2024:9572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9572
16
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
17
reference_url https://access.redhat.com/errata/RHSA-2024:9576
reference_id RHSA-2024:9576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9576
18
reference_url https://access.redhat.com/errata/RHSA-2024:9654
reference_id RHSA-2024:9654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9654
19
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
20
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52530
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svba-hf1d-y7ez
16
url VCID-uk2y-997k-4qat
vulnerability_id VCID-uk2y-997k-4qat
summary libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35515
published_at 2026-04-21T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35617
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35642
published_at 2026-04-04T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35524
published_at 2026-04-07T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.3557
published_at 2026-04-08T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35594
published_at 2026-04-09T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35604
published_at 2026-04-11T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.3556
published_at 2026-04-12T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-13T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35576
published_at 2026-04-16T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35566
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
reference_id 1087417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
reference_id 1089240
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
reference_id 2325277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
reference_id 407
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
reference_id 407#note_2316401
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2025:0791
reference_id RHSA-2025:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0791
11
reference_url https://access.redhat.com/errata/RHSA-2025:0838
reference_id RHSA-2025:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0838
12
reference_url https://access.redhat.com/errata/RHSA-2025:0847
reference_id RHSA-2025:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0847
13
reference_url https://access.redhat.com/errata/RHSA-2025:0848
reference_id RHSA-2025:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0848
14
reference_url https://access.redhat.com/errata/RHSA-2025:0882
reference_id RHSA-2025:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0882
15
reference_url https://access.redhat.com/errata/RHSA-2025:0889
reference_id RHSA-2025:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0889
16
reference_url https://access.redhat.com/errata/RHSA-2025:0903
reference_id RHSA-2025:0903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0903
17
reference_url https://access.redhat.com/errata/RHSA-2025:0949
reference_id RHSA-2025:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0949
18
reference_url https://access.redhat.com/errata/RHSA-2025:1047
reference_id RHSA-2025:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1047
19
reference_url https://access.redhat.com/errata/RHSA-2025:1075
reference_id RHSA-2025:1075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1075
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_id using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
22
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
23
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
24
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52531
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uk2y-997k-4qat
17
url VCID-v9pv-qh9a-97g9
vulnerability_id VCID-v9pv-qh9a-97g9
summary libsoup: infinite loop while reading websocket data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42427
published_at 2026-04-21T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42508
published_at 2026-04-08T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42518
published_at 2026-04-09T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.4254
published_at 2026-04-11T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42503
published_at 2026-04-12T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42472
published_at 2026-04-13T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42523
published_at 2026-04-16T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42498
published_at 2026-04-18T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42491
published_at 2026-04-02T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42519
published_at 2026-04-04T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42457
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
reference_id 1087416
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
reference_id 1089238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
reference_id 2325276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
reference_id 391
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
reference_id 410
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
11
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
12
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
13
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
14
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52532
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9pv-qh9a-97g9
18
url VCID-yx68-81fu-ffar
vulnerability_id VCID-yx68-81fu-ffar
summary libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66829
published_at 2026-04-02T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-12T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66863
published_at 2026-04-13T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66896
published_at 2026-04-16T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.6691
published_at 2026-04-18T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66892
published_at 2026-04-21T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66854
published_at 2026-04-04T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66827
published_at 2026-04-07T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-08T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-09T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66909
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
reference_id 1103267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
reference_id 1103512
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
reference_id 2359358
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/436
reference_id 436
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/436
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
29
reference_url https://access.redhat.com/security/cve/CVE-2025-32914
reference_id CVE-2025-32914
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/security/cve/CVE-2025-32914
30
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:21657
31
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:7505
32
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8126
33
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8132
34
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8139
35
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8140
36
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8252
37
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8480
38
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8481
39
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8482
40
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8663
41
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:9179
42
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
43
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
44
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32914
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx68-81fu-ffar
19
url VCID-zhp7-2ks9-m7es
vulnerability_id VCID-zhp7-2ks9-m7es
summary libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-21T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.76868
published_at 2026-04-13T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76909
published_at 2026-04-16T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-18T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76843
published_at 2026-04-04T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-07T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76855
published_at 2026-04-08T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-09T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.76894
published_at 2026-04-11T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.76873
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
reference_id 2359357
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32913
reference_id CVE-2025-32913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/security/cve/CVE-2025-32913
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32913
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhp7-2ks9-m7es
20
url VCID-zrmu-bwfg-e3hp
vulnerability_id VCID-zrmu-bwfg-e3hp
summary libsoup: Heap buffer overflow in sniff_unknown()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-21T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
reference_id 1102214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
reference_id 2357069
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/425
reference_id 425
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/425
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
18
reference_url https://access.redhat.com/security/cve/CVE-2025-32052
reference_id CVE-2025-32052
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/security/cve/CVE-2025-32052
19
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4440
20
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4508
21
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4560
22
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4568
23
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:7436
24
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:8292
25
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
26
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32052
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrmu-bwfg-e3hp
21
url VCID-zsdd-pzyb-nbdf
vulnerability_id VCID-zsdd-pzyb-nbdf
summary libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-21T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
reference_id 1102215
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
reference_id 2357070
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32053
reference_id CVE-2025-32053
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/security/cve/CVE-2025-32053
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32053
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdd-pzyb-nbdf
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.30.2-1%252Bsqueeze1