Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libsoup2.4@0?distro=trixie
Typedeb
Namespacedebian
Namelibsoup2.4
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.34.3-1
Latest_non_vulnerable_version2.74.3-10
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1sfd-nkd4-5fej
vulnerability_id VCID-1sfd-nkd4-5fej
summary libsoup: Segmentation fault when parsing malformed data URI
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32051.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32051
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-02T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61671
published_at 2026-04-18T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61644
published_at 2026-04-12T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61624
published_at 2026-04-13T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61665
published_at 2026-04-16T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.616
published_at 2026-04-04T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61571
published_at 2026-04-07T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61619
published_at 2026-04-08T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.61633
published_at 2026-04-09T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32051
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357068
reference_id 2357068
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:46:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357068
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2025-32051
reference_id CVE-2025-32051
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:46:14Z/
url https://access.redhat.com/security/cve/CVE-2025-32051
10
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@0?distro=trixie
purl pkg:deb/debian/libsoup2.4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@0%3Fdistro=trixie
1
url pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-htuv-qv35-gycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1%3Fdistro=trixie
aliases CVE-2025-32051
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1sfd-nkd4-5fej
1
url VCID-mxjn-d8v7-8ubc
vulnerability_id VCID-mxjn-d8v7-8ubc
summary libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12105.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-12105
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20197
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20356
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20309
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20263
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20204
published_at 2026-04-13T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20196
published_at 2026-04-16T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.202
published_at 2026-04-18T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20417
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20142
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20282
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-12105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118783
reference_id 1118783
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118783
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405992
reference_id 2405992
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2405992
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
reference_id 481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
12
reference_url https://access.redhat.com/security/cve/CVE-2025-12105
reference_id CVE-2025-12105
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/security/cve/CVE-2025-12105
13
reference_url https://access.redhat.com/errata/RHSA-2025:23139
reference_id RHSA-2025:23139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/errata/RHSA-2025:23139
14
reference_url https://access.redhat.com/errata/RHSA-2025:23437
reference_id RHSA-2025:23437
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/errata/RHSA-2025:23437
15
reference_url https://usn.ubuntu.com/7932-1/
reference_id USN-7932-1
reference_type
scores
url https://usn.ubuntu.com/7932-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@0?distro=trixie
purl pkg:deb/debian/libsoup2.4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@0%3Fdistro=trixie
1
url pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-htuv-qv35-gycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1%3Fdistro=trixie
aliases CVE-2025-12105
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxjn-d8v7-8ubc
2
url VCID-v11f-c1ed-j7d1
vulnerability_id VCID-v11f-c1ed-j7d1
summary libsoup: Denial of service on libsoup through HTTP/2 server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32908.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32908.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32908
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57398
published_at 2026-04-18T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.5735
published_at 2026-04-02T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57396
published_at 2026-04-12T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57376
published_at 2026-04-21T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57402
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57373
published_at 2026-04-04T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57349
published_at 2026-04-07T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.574
published_at 2026-04-08T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57403
published_at 2026-04-09T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57418
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32908
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103265
reference_id 1103265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103265
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359343
reference_id 2359343
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359343
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2025-32908
reference_id CVE-2025-32908
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32908
11
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://access.redhat.com/errata/RHSA-2025:7505
12
reference_url https://usn.ubuntu.com/7543-1/
reference_id USN-7543-1
reference_type
scores
url https://usn.ubuntu.com/7543-1/
fixed_packages
0
url pkg:deb/debian/libsoup2.4@0?distro=trixie
purl pkg:deb/debian/libsoup2.4@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@0%3Fdistro=trixie
1
url pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-htuv-qv35-gycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1%3Fdistro=trixie
aliases CVE-2025-32908
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v11f-c1ed-j7d1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@0%3Fdistro=trixie