Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libsoup2.4@2.64.2-2
Typedeb
Namespacedebian
Namelibsoup2.4
Version2.64.2-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-24tr-cene-gfch
vulnerability_id VCID-24tr-cene-gfch
summary libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69874
published_at 2026-04-18T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69822
published_at 2026-04-13T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69864
published_at 2026-04-16T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69774
published_at 2026-04-02T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69789
published_at 2026-04-04T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69765
published_at 2026-04-07T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69814
published_at 2026-04-08T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69829
published_at 2026-04-09T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69852
published_at 2026-04-11T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69837
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
reference_id 2359355
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32911
reference_id CVE-2025-32911
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/security/cve/CVE-2025-32911
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32911
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24tr-cene-gfch
1
url VCID-4m39-v7d7-1ba7
vulnerability_id VCID-4m39-v7d7-1ba7
summary libsoup: Integer overflow in append_param_quoted
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75427
published_at 2026-04-18T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75379
published_at 2026-04-13T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.7542
published_at 2026-04-16T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75327
published_at 2026-04-02T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75359
published_at 2026-04-04T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75392
published_at 2026-04-09T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
reference_id 1102212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
reference_id 2357067
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32050
reference_id CVE-2025-32050
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/security/cve/CVE-2025-32050
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32050
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m39-v7d7-1ba7
2
url VCID-6skx-v6sg-53gq
vulnerability_id VCID-6skx-v6sg-53gq
summary libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
reference_id
reference_type
scores
0
value 0.02145
scoring_system epss
scoring_elements 0.84169
published_at 2026-04-02T12:55:00Z
1
value 0.02145
scoring_system epss
scoring_elements 0.84234
published_at 2026-04-11T12:55:00Z
2
value 0.02145
scoring_system epss
scoring_elements 0.84228
published_at 2026-04-12T12:55:00Z
3
value 0.02145
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-13T12:55:00Z
4
value 0.02145
scoring_system epss
scoring_elements 0.84246
published_at 2026-04-16T12:55:00Z
5
value 0.02145
scoring_system epss
scoring_elements 0.84247
published_at 2026-04-18T12:55:00Z
6
value 0.02145
scoring_system epss
scoring_elements 0.84187
published_at 2026-04-04T12:55:00Z
7
value 0.02145
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-07T12:55:00Z
8
value 0.02145
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-08T12:55:00Z
9
value 0.02145
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
reference_id 1102208
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
reference_id 2354669
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
reference_id 422
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-2784
reference_id CVE-2025-2784
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/security/cve/CVE-2025-2784
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:7505
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:9179
41
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
42
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-2784
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6skx-v6sg-53gq
3
url VCID-7hhg-3u9v-nqfw
vulnerability_id VCID-7hhg-3u9v-nqfw
summary libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52803
published_at 2026-04-02T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52893
published_at 2026-04-11T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52877
published_at 2026-04-12T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-13T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-04-16T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52905
published_at 2026-04-18T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.5283
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52797
published_at 2026-04-07T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52849
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
reference_id 1106205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
reference_id 1106375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
reference_id 2367175
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
reference_id 448
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-4945
reference_id CVE-2025-4945
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/security/cve/CVE-2025-4945
33
reference_url https://access.redhat.com/errata/RHSA-2025:19713
reference_id RHSA-2025:19713
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19713
34
reference_url https://access.redhat.com/errata/RHSA-2025:19714
reference_id RHSA-2025:19714
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19714
35
reference_url https://access.redhat.com/errata/RHSA-2025:19720
reference_id RHSA-2025:19720
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19720
36
reference_url https://access.redhat.com/errata/RHSA-2025:20959
reference_id RHSA-2025:20959
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:20959
37
reference_url https://access.redhat.com/errata/RHSA-2025:21032
reference_id RHSA-2025:21032
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21032
38
reference_url https://access.redhat.com/errata/RHSA-2025:21655
reference_id RHSA-2025:21655
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21655
39
reference_url https://access.redhat.com/errata/RHSA-2025:21656
reference_id RHSA-2025:21656
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21656
40
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21657
41
reference_url https://access.redhat.com/errata/RHSA-2025:21664
reference_id RHSA-2025:21664
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21664
42
reference_url https://access.redhat.com/errata/RHSA-2025:21665
reference_id RHSA-2025:21665
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21665
43
reference_url https://access.redhat.com/errata/RHSA-2025:21666
reference_id RHSA-2025:21666
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21666
44
reference_url https://access.redhat.com/errata/RHSA-2025:21772
reference_id RHSA-2025:21772
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21772
45
reference_url https://access.redhat.com/errata/RHSA-2025:22013
reference_id RHSA-2025:22013
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:22013
46
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4945
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hhg-3u9v-nqfw
4
url VCID-9uua-rxjd-fkf6
vulnerability_id VCID-9uua-rxjd-fkf6
summary libsoup: Off-by-One Out-of-Bounds Read in find_boundary() in soup-multipart.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68581
published_at 2026-04-18T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68481
published_at 2026-04-02T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68559
published_at 2026-04-12T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68528
published_at 2026-04-13T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68568
published_at 2026-04-16T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.685
published_at 2026-04-04T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-07T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-08T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68545
published_at 2026-04-09T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
reference_id 1106248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
reference_id 1106325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
reference_id 2367552
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4969
reference_id CVE-2025-4969
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://access.redhat.com/security/cve/CVE-2025-4969
13
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4969
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uua-rxjd-fkf6
5
url VCID-athp-xk5g-jbhu
vulnerability_id VCID-athp-xk5g-jbhu
summary libsoup: NULL Pointer Dereference on libsoup through function "sniff_mp4" in soup-content-sniffer.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66973
published_at 2026-04-18T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-12T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66926
published_at 2026-04-13T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-16T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66916
published_at 2026-04-04T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66938
published_at 2026-04-08T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-09T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66971
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
reference_id 1103517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
reference_id 2359353
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32909
reference_id CVE-2025-32909
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/security/cve/CVE-2025-32909
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32909
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-athp-xk5g-jbhu
6
url VCID-f481-8mb7-dbed
vulnerability_id VCID-f481-8mb7-dbed
summary libsoup: Null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
reference_id 2359354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32910
reference_id CVE-2025-32910
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/security/cve/CVE-2025-32910
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32910
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f481-8mb7-dbed
7
url VCID-fwhq-2jj5-wka3
vulnerability_id VCID-fwhq-2jj5-wka3
summary libsoup: heap-based over-read in soup_ntlm_parse_challenge() in soup-auth-ntlm.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17266.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17266
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76218
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76324
published_at 2026-04-18T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76278
published_at 2026-04-13T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.76319
published_at 2026-04-16T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76221
published_at 2026-04-02T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76253
published_at 2026-04-04T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76233
published_at 2026-04-07T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76265
published_at 2026-04-08T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-09T12:55:00Z
9
value 0.00942
scoring_system epss
scoring_elements 0.76305
published_at 2026-04-11T12:55:00Z
10
value 0.00942
scoring_system epss
scoring_elements 0.76283
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17266
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17266
4
reference_url https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md
reference_id
reference_type
scores
url https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/issues/173
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/issues/173
8
reference_url https://security-tracker.debian.org/tracker/CVE-2019-17266
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2019-17266
9
reference_url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
reference_id
reference_type
scores
url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1771292
reference_id 1771292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1771292
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17266
reference_id CVE-2019-17266
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17266
15
reference_url https://usn.ubuntu.com/4152-1/
reference_id USN-4152-1
reference_type
scores
url https://usn.ubuntu.com/4152-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.72.0-2
purl pkg:deb/debian/libsoup2.4@2.72.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2
aliases CVE-2019-17266
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwhq-2jj5-wka3
8
url VCID-k9bu-zasm-vfgr
vulnerability_id VCID-k9bu-zasm-vfgr
summary libsoup: NULL pointer dereference in client when server omits the "nonce" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
reference_id 2359356
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-32912
reference_id CVE-2025-32912
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/security/cve/CVE-2025-32912
12
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/errata/RHSA-2025:7505
13
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
14
reference_url https://usn.ubuntu.com/7490-2/
reference_id USN-7490-2
reference_type
scores
url https://usn.ubuntu.com/7490-2/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32912
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9bu-zasm-vfgr
9
url VCID-ku6w-4wsv-qbe4
vulnerability_id VCID-ku6w-4wsv-qbe4
summary libsoup: Out of bounds reads in soup_headers_parse_request()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
reference_id
reference_type
scores
0
value 0.00795
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-18T12:55:00Z
1
value 0.00795
scoring_system epss
scoring_elements 0.73929
published_at 2026-04-02T12:55:00Z
2
value 0.00795
scoring_system epss
scoring_elements 0.73979
published_at 2026-04-12T12:55:00Z
3
value 0.00795
scoring_system epss
scoring_elements 0.73971
published_at 2026-04-13T12:55:00Z
4
value 0.00795
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-16T12:55:00Z
5
value 0.00795
scoring_system epss
scoring_elements 0.73954
published_at 2026-04-04T12:55:00Z
6
value 0.00795
scoring_system epss
scoring_elements 0.73926
published_at 2026-04-07T12:55:00Z
7
value 0.00795
scoring_system epss
scoring_elements 0.7396
published_at 2026-04-08T12:55:00Z
8
value 0.00795
scoring_system epss
scoring_elements 0.73974
published_at 2026-04-09T12:55:00Z
9
value 0.00795
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
reference_id 1103521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
reference_id 2359341
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32906
reference_id CVE-2025-32906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/security/cve/CVE-2025-32906
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7505
44
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:8292
45
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:9179
46
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
47
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32906
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku6w-4wsv-qbe4
10
url VCID-rd74-1427-eybf
vulnerability_id VCID-rd74-1427-eybf
summary libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
reference_id
reference_type
scores
0
value 0.00986
scoring_system epss
scoring_elements 0.76778
published_at 2026-04-02T12:55:00Z
1
value 0.00986
scoring_system epss
scoring_elements 0.76858
published_at 2026-04-11T12:55:00Z
2
value 0.00986
scoring_system epss
scoring_elements 0.76837
published_at 2026-04-12T12:55:00Z
3
value 0.00986
scoring_system epss
scoring_elements 0.76831
published_at 2026-04-13T12:55:00Z
4
value 0.00986
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-16T12:55:00Z
5
value 0.00986
scoring_system epss
scoring_elements 0.7688
published_at 2026-04-18T12:55:00Z
6
value 0.00986
scoring_system epss
scoring_elements 0.76807
published_at 2026-04-04T12:55:00Z
7
value 0.00986
scoring_system epss
scoring_elements 0.76787
published_at 2026-04-07T12:55:00Z
8
value 0.00986
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-08T12:55:00Z
9
value 0.00986
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
reference_id 1106204
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
reference_id 1106337
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
reference_id 2367183
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
reference_id 449
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
29
reference_url https://access.redhat.com/security/cve/CVE-2025-4948
reference_id CVE-2025-4948
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/security/cve/CVE-2025-4948
30
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:21657
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8128
reference_id RHSA-2025:8128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8128
33
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8132
34
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8139
35
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8140
36
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8252
37
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8480
38
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8481
39
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8482
40
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8663
41
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:9179
42
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4948
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rd74-1427-eybf
11
url VCID-sabm-gujq-j3fb
vulnerability_id VCID-sabm-gujq-j3fb
summary libsoup: Null pointer dereference in libsoup may lead to Denial Of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49641
published_at 2026-04-18T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49578
published_at 2026-04-02T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49594
published_at 2026-04-12T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49596
published_at 2026-04-13T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49643
published_at 2026-04-16T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49605
published_at 2026-04-04T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49557
published_at 2026-04-07T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49612
published_at 2026-04-08T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49606
published_at 2026-04-09T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49623
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
reference_id 1105887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
reference_id 1107757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
reference_id 2366513
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4476
reference_id CVE-2025-4476
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://access.redhat.com/security/cve/CVE-2025-4476
13
reference_url https://usn.ubuntu.com/7543-1/
reference_id USN-7543-1
reference_type
scores
url https://usn.ubuntu.com/7543-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2025-4476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sabm-gujq-j3fb
12
url VCID-svba-hf1d-y7ez
vulnerability_id VCID-svba-hf1d-y7ez
summary libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58651
published_at 2026-04-16T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.58611
published_at 2026-04-04T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58581
published_at 2026-04-07T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.58633
published_at 2026-04-08T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.5864
published_at 2026-04-09T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58656
published_at 2026-04-18T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58637
published_at 2026-04-12T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58617
published_at 2026-04-13T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.5859
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
reference_id 1088812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
reference_id 2325284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
reference_id 377
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
reference_id 402
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
8
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
9
reference_url https://access.redhat.com/errata/RHSA-2024:9501
reference_id RHSA-2024:9501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9501
10
reference_url https://access.redhat.com/errata/RHSA-2024:9524
reference_id RHSA-2024:9524
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9524
11
reference_url https://access.redhat.com/errata/RHSA-2024:9525
reference_id RHSA-2024:9525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9525
12
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
13
reference_url https://access.redhat.com/errata/RHSA-2024:9566
reference_id RHSA-2024:9566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9566
14
reference_url https://access.redhat.com/errata/RHSA-2024:9570
reference_id RHSA-2024:9570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9570
15
reference_url https://access.redhat.com/errata/RHSA-2024:9572
reference_id RHSA-2024:9572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9572
16
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
17
reference_url https://access.redhat.com/errata/RHSA-2024:9576
reference_id RHSA-2024:9576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9576
18
reference_url https://access.redhat.com/errata/RHSA-2024:9654
reference_id RHSA-2024:9654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9654
19
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
20
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52530
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svba-hf1d-y7ez
13
url VCID-uk2y-997k-4qat
vulnerability_id VCID-uk2y-997k-4qat
summary libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35566
published_at 2026-04-18T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35617
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35642
published_at 2026-04-04T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35524
published_at 2026-04-07T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.3557
published_at 2026-04-08T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35594
published_at 2026-04-09T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35604
published_at 2026-04-11T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.3556
published_at 2026-04-12T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-13T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35576
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
reference_id 1087417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
reference_id 1089240
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
reference_id 2325277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
reference_id 407
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
reference_id 407#note_2316401
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2025:0791
reference_id RHSA-2025:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0791
11
reference_url https://access.redhat.com/errata/RHSA-2025:0838
reference_id RHSA-2025:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0838
12
reference_url https://access.redhat.com/errata/RHSA-2025:0847
reference_id RHSA-2025:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0847
13
reference_url https://access.redhat.com/errata/RHSA-2025:0848
reference_id RHSA-2025:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0848
14
reference_url https://access.redhat.com/errata/RHSA-2025:0882
reference_id RHSA-2025:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0882
15
reference_url https://access.redhat.com/errata/RHSA-2025:0889
reference_id RHSA-2025:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0889
16
reference_url https://access.redhat.com/errata/RHSA-2025:0903
reference_id RHSA-2025:0903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0903
17
reference_url https://access.redhat.com/errata/RHSA-2025:0949
reference_id RHSA-2025:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0949
18
reference_url https://access.redhat.com/errata/RHSA-2025:1047
reference_id RHSA-2025:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1047
19
reference_url https://access.redhat.com/errata/RHSA-2025:1075
reference_id RHSA-2025:1075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1075
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_id using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
22
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
23
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
24
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52531
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uk2y-997k-4qat
14
url VCID-v9pv-qh9a-97g9
vulnerability_id VCID-v9pv-qh9a-97g9
summary libsoup: infinite loop while reading websocket data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42498
published_at 2026-04-18T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42457
published_at 2026-04-07T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42508
published_at 2026-04-08T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42518
published_at 2026-04-09T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.4254
published_at 2026-04-11T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42503
published_at 2026-04-12T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42472
published_at 2026-04-13T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42523
published_at 2026-04-16T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42491
published_at 2026-04-02T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42519
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
reference_id 1087416
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
reference_id 1089238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
reference_id 2325276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
reference_id 391
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
reference_id 410
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
11
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
12
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
13
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
14
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
aliases CVE-2024-52532
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9pv-qh9a-97g9
15
url VCID-yx68-81fu-ffar
vulnerability_id VCID-yx68-81fu-ffar
summary libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.6691
published_at 2026-04-18T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.66863
published_at 2026-04-13T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66896
published_at 2026-04-16T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66829
published_at 2026-04-02T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.66854
published_at 2026-04-04T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66827
published_at 2026-04-07T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-08T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-09T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66909
published_at 2026-04-11T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
reference_id 1103267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
reference_id 1103512
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
reference_id 2359358
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-32914
reference_id CVE-2025-32914
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/security/cve/CVE-2025-32914
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:7505
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:9179
41
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
42
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
43
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32914
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx68-81fu-ffar
16
url VCID-zhp7-2ks9-m7es
vulnerability_id VCID-zhp7-2ks9-m7es
summary libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-18T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76868
published_at 2026-04-13T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.76909
published_at 2026-04-16T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-02T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76843
published_at 2026-04-04T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-07T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76855
published_at 2026-04-08T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-09T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76894
published_at 2026-04-11T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.76873
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
reference_id 2359357
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32913
reference_id CVE-2025-32913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/security/cve/CVE-2025-32913
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32913
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhp7-2ks9-m7es
17
url VCID-zrmu-bwfg-e3hp
vulnerability_id VCID-zrmu-bwfg-e3hp
summary libsoup: Heap buffer overflow in sniff_unknown()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
reference_id 1102214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
reference_id 2357069
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32052
reference_id CVE-2025-32052
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/security/cve/CVE-2025-32052
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32052
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrmu-bwfg-e3hp
18
url VCID-zsdd-pzyb-nbdf
vulnerability_id VCID-zsdd-pzyb-nbdf
summary libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
reference_id 1102215
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
reference_id 2357070
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32053
reference_id CVE-2025-32053
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/security/cve/CVE-2025-32053
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
aliases CVE-2025-32053
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdd-pzyb-nbdf
Fixing_vulnerabilities
0
url VCID-2fpq-q21y-83a7
vulnerability_id VCID-2fpq-q21y-83a7
summary
A vulnerability in libsoup might allow remote attackers to execute
    arbitrary code.
references
0
reference_url http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2885.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2885.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2885
reference_id
reference_type
scores
0
value 0.08547
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-01T12:55:00Z
1
value 0.08547
scoring_system epss
scoring_elements 0.9241
published_at 2026-04-18T12:55:00Z
2
value 0.08547
scoring_system epss
scoring_elements 0.92373
published_at 2026-04-04T12:55:00Z
3
value 0.08547
scoring_system epss
scoring_elements 0.92377
published_at 2026-04-07T12:55:00Z
4
value 0.08547
scoring_system epss
scoring_elements 0.92388
published_at 2026-04-08T12:55:00Z
5
value 0.08547
scoring_system epss
scoring_elements 0.92393
published_at 2026-04-09T12:55:00Z
6
value 0.08547
scoring_system epss
scoring_elements 0.92399
published_at 2026-04-13T12:55:00Z
7
value 0.08547
scoring_system epss
scoring_elements 0.92401
published_at 2026-04-12T12:55:00Z
8
value 0.08547
scoring_system epss
scoring_elements 0.92366
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2885
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
4
reference_url http://seclists.org/fulldisclosure/2020/Dec/3
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2020/Dec/3
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.debian.org/security/2017/dsa-3929
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3929
7
reference_url https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392
reference_id
reference_type
scores
url https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392
8
reference_url http://www.securityfocus.com/bid/100258
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100258
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479281
reference_id 1479281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479281
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871650
reference_id 871650
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871650
11
reference_url https://security.archlinux.org/ASA-201708-5
reference_id ASA-201708-5
reference_type
scores
url https://security.archlinux.org/ASA-201708-5
12
reference_url https://security.archlinux.org/AVG-376
reference_id AVG-376
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-376
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.58:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-2885
reference_id CVE-2017-2885
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-2885
24
reference_url https://security.gentoo.org/glsa/201709-26
reference_id GLSA-201709-26
reference_type
scores
url https://security.gentoo.org/glsa/201709-26
25
reference_url https://access.redhat.com/errata/RHSA-2017:2459
reference_id RHSA-2017:2459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2459
26
reference_url https://usn.ubuntu.com/3383-1/
reference_id USN-3383-1
reference_type
scores
url https://usn.ubuntu.com/3383-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.48.0-1%2Bdeb8u1
purl pkg:deb/debian/libsoup2.4@2.48.0-1%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.48.0-1%252Bdeb8u1
1
url pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
purl pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.56.0-2%252Bdeb9u2
2
url pkg:deb/debian/libsoup2.4@2.64.2-2
purl pkg:deb/debian/libsoup2.4@2.64.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-fwhq-2jj5-wka3
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.64.2-2
aliases CVE-2017-2885
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fpq-q21y-83a7
1
url VCID-9vuw-57ex-k7ez
vulnerability_id VCID-9vuw-57ex-k7ez
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
1
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
2
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
reference_id
reference_type
scores
0
value 0.04219
scoring_system epss
scoring_elements 0.88775
published_at 2026-04-18T12:55:00Z
1
value 0.04219
scoring_system epss
scoring_elements 0.88764
published_at 2026-04-13T12:55:00Z
2
value 0.04219
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-16T12:55:00Z
3
value 0.07838
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-01T12:55:00Z
4
value 0.07838
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-02T12:55:00Z
5
value 0.07838
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-04T12:55:00Z
6
value 0.07838
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-07T12:55:00Z
7
value 0.07838
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-08T12:55:00Z
8
value 0.07838
scoring_system epss
scoring_elements 0.91991
published_at 2026-04-09T12:55:00Z
9
value 0.07838
scoring_system epss
scoring_elements 0.91994
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
9
reference_url https://gitlab.gnome.org/GNOME/libsoup/issues/3
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/issues/3
10
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
12
reference_url https://www.debian.org/security/2018/dsa-4241
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4241
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
reference_id 1597980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
reference_id CVE-2018-12910
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
28
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
29
reference_url https://usn.ubuntu.com/3701-1/
reference_id USN-3701-1
reference_type
scores
url https://usn.ubuntu.com/3701-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
purl pkg:deb/debian/libsoup2.4@2.56.0-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-2fpq-q21y-83a7
2
vulnerability VCID-4m39-v7d7-1ba7
3
vulnerability VCID-6skx-v6sg-53gq
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-9vuw-57ex-k7ez
7
vulnerability VCID-athp-xk5g-jbhu
8
vulnerability VCID-f481-8mb7-dbed
9
vulnerability VCID-fwhq-2jj5-wka3
10
vulnerability VCID-k9bu-zasm-vfgr
11
vulnerability VCID-ku6w-4wsv-qbe4
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-svba-hf1d-y7ez
15
vulnerability VCID-uk2y-997k-4qat
16
vulnerability VCID-v9pv-qh9a-97g9
17
vulnerability VCID-yx68-81fu-ffar
18
vulnerability VCID-zhp7-2ks9-m7es
19
vulnerability VCID-zrmu-bwfg-e3hp
20
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.56.0-2%252Bdeb9u2
1
url pkg:deb/debian/libsoup2.4@2.64.2-2
purl pkg:deb/debian/libsoup2.4@2.64.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-fwhq-2jj5-wka3
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.64.2-2
aliases CVE-2018-12910
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vuw-57ex-k7ez
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.64.2-2