Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
Typedeb
Namespacedebian
Namelibsoup3
Version3.2.3-0+deb12u2
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.5.2-1
Latest_non_vulnerable_version3.6.6-1
Affected_by_vulnerabilities
0
url VCID-1vz1-x5py-dkg5
vulnerability_id VCID-1vz1-x5py-dkg5
summary A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1539.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1539
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18107
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18212
published_at 2026-04-09T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18217
published_at 2026-04-11T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18169
published_at 2026-04-12T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18118
published_at 2026-04-13T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-16T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18073
published_at 2026-04-18T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18156
published_at 2026-04-08T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-02T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22609
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1539
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126628
reference_id 1126628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126628
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/489
reference_id 489
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:09:01Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/489
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2026-1539
reference_id CVE-2026-1539
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:09:01Z/
url https://access.redhat.com/security/cve/CVE-2026-1539
12
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1539
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vz1-x5py-dkg5
1
url VCID-3zqd-pcvp-a7ed
vulnerability_id VCID-3zqd-pcvp-a7ed
summary libsoup: SoupServer: Denial of Service via HTTP request smuggling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1760.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1760
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03586
published_at 2026-04-04T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03572
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03597
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03598
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0362
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03931
published_at 2026-04-12T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03902
published_at 2026-04-13T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03881
published_at 2026-04-16T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03891
published_at 2026-04-18T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04012
published_at 2026-04-21T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03948
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126876
reference_id 1126876
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126876
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435951
reference_id 2435951
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435951
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/475
reference_id 475
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/475
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1760
reference_id CVE-2026-1760
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://access.redhat.com/security/cve/CVE-2026-1760
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1760
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zqd-pcvp-a7ed
2
url VCID-4scr-ppqy-5ugf
vulnerability_id VCID-4scr-ppqy-5ugf
summary libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32907.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32907.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32907
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.7681
published_at 2026-04-02T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-12T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.76864
published_at 2026-04-13T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76906
published_at 2026-04-16T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76911
published_at 2026-04-18T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76839
published_at 2026-04-04T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.7682
published_at 2026-04-07T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76851
published_at 2026-04-08T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76862
published_at 2026-04-09T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7689
published_at 2026-04-11T12:55:00Z
10
value 0.01185
scoring_system epss
scoring_elements 0.78806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32907
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32907
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103264
reference_id 1103264
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103264
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103518
reference_id 1103518
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103518
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359342
reference_id 2359342
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359342
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32907
reference_id CVE-2025-32907
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/security/cve/CVE-2025-32907
18
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:4439
19
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:4440
20
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:4508
21
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:7436
22
reference_url https://access.redhat.com/errata/RHSA-2025:8128
reference_id RHSA-2025:8128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:8128
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:20Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32907
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4scr-ppqy-5ugf
3
url VCID-6sbg-fgfs-43b6
vulnerability_id VCID-6sbg-fgfs-43b6
summary libsoup: Out-of-Bounds Read in libsoup handle_partial_get() Leading to Heap Information Disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2443.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2443
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10088
published_at 2026-04-18T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10267
published_at 2026-04-09T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-16T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10237
published_at 2026-04-13T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10257
published_at 2026-04-12T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10297
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12217
published_at 2026-04-04T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12171
published_at 2026-04-02T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14404
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14321
published_at 2026-04-07T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2443
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127905
reference_id 1127905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127905
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439671
reference_id 2439671
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T12:40:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2439671
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/487
reference_id 487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T12:40:40Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/487
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-2443
reference_id CVE-2026-2443
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T12:40:40Z/
url https://access.redhat.com/security/cve/CVE-2026-2443
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-2443
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6sbg-fgfs-43b6
4
url VCID-7hhg-3u9v-nqfw
vulnerability_id VCID-7hhg-3u9v-nqfw
summary libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52803
published_at 2026-04-02T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52877
published_at 2026-04-12T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-13T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-04-16T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52905
published_at 2026-04-18T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52889
published_at 2026-04-21T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.5283
published_at 2026-04-04T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52797
published_at 2026-04-07T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52849
published_at 2026-04-08T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52843
published_at 2026-04-09T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52893
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
reference_id 1106205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106205
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
reference_id 1106375
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106375
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
reference_id 2367175
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367175
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
reference_id 448
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-4945
reference_id CVE-2025-4945
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/security/cve/CVE-2025-4945
33
reference_url https://access.redhat.com/errata/RHSA-2025:19713
reference_id RHSA-2025:19713
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19713
34
reference_url https://access.redhat.com/errata/RHSA-2025:19714
reference_id RHSA-2025:19714
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19714
35
reference_url https://access.redhat.com/errata/RHSA-2025:19720
reference_id RHSA-2025:19720
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:19720
36
reference_url https://access.redhat.com/errata/RHSA-2025:20959
reference_id RHSA-2025:20959
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:20959
37
reference_url https://access.redhat.com/errata/RHSA-2025:21032
reference_id RHSA-2025:21032
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21032
38
reference_url https://access.redhat.com/errata/RHSA-2025:21655
reference_id RHSA-2025:21655
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21655
39
reference_url https://access.redhat.com/errata/RHSA-2025:21656
reference_id RHSA-2025:21656
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21656
40
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21657
41
reference_url https://access.redhat.com/errata/RHSA-2025:21664
reference_id RHSA-2025:21664
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21664
42
reference_url https://access.redhat.com/errata/RHSA-2025:21665
reference_id RHSA-2025:21665
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21665
43
reference_url https://access.redhat.com/errata/RHSA-2025:21666
reference_id RHSA-2025:21666
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21666
44
reference_url https://access.redhat.com/errata/RHSA-2025:21772
reference_id RHSA-2025:21772
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:21772
45
reference_url https://access.redhat.com/errata/RHSA-2025:22013
reference_id RHSA-2025:22013
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-19T18:15:34Z/
url https://access.redhat.com/errata/RHSA-2025:22013
46
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-4945
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hhg-3u9v-nqfw
5
url VCID-9uua-rxjd-fkf6
vulnerability_id VCID-9uua-rxjd-fkf6
summary libsoup: Off-by-One Out-of-Bounds Read in find_boundary() in soup-multipart.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68558
published_at 2026-04-21T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68481
published_at 2026-04-02T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68528
published_at 2026-04-13T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68568
published_at 2026-04-16T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68581
published_at 2026-04-18T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.685
published_at 2026-04-04T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-07T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68527
published_at 2026-04-08T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68545
published_at 2026-04-09T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68571
published_at 2026-04-11T12:55:00Z
10
value 0.00568
scoring_system epss
scoring_elements 0.68559
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4969
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
reference_id 1106248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106248
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
reference_id 1106325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106325
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
reference_id 2367552
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367552
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4969
reference_id CVE-2025-4969
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-21T10:19:28Z/
url https://access.redhat.com/security/cve/CVE-2025-4969
13
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-4969
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uua-rxjd-fkf6
6
url VCID-cjwc-3fs8-17ef
vulnerability_id VCID-cjwc-3fs8-17ef
summary libsoup: libsoup: HTTP Request Smuggling via malformed chunk headers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1801.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1801
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0836
published_at 2026-04-12T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08343
published_at 2026-04-13T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08236
published_at 2026-04-16T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08222
published_at 2026-04-18T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11316
published_at 2026-04-02T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11376
published_at 2026-04-04T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1118
published_at 2026-04-07T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.1126
published_at 2026-04-08T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11315
published_at 2026-04-09T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1132
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1801
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436315
reference_id 2436315
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2436315
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/481
reference_id 481
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/481
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2026-1801
reference_id CVE-2026-1801
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://access.redhat.com/security/cve/CVE-2026-1801
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1801
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjwc-3fs8-17ef
7
url VCID-dnrq-3tff-nfc3
vulnerability_id VCID-dnrq-3tff-nfc3
summary libsoup: Out-of-Bounds Read in libsoup WebSocket Frame Processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0716.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0716
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17232
published_at 2026-04-21T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17371
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.1736
published_at 2026-04-11T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17311
published_at 2026-04-12T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17253
published_at 2026-04-13T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17193
published_at 2026-04-16T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17199
published_at 2026-04-18T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17417
published_at 2026-04-04T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17197
published_at 2026-04-07T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17289
published_at 2026-04-08T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17347
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0716
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125156
reference_id 1125156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125156
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2427896
reference_id 2427896
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T14:35:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2427896
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/476
reference_id 476
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T14:35:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/476
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-0716
reference_id CVE-2026-0716
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T14:35:48Z/
url https://access.redhat.com/security/cve/CVE-2026-0716
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-9?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-9%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-0716
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnrq-3tff-nfc3
8
url VCID-ka6q-xta6-ukdp
vulnerability_id VCID-ka6q-xta6-ukdp
summary libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1761.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1761
reference_id
reference_type
scores
0
value 0.01174
scoring_system epss
scoring_elements 0.78718
published_at 2026-04-21T12:55:00Z
1
value 0.01174
scoring_system epss
scoring_elements 0.78722
published_at 2026-04-18T12:55:00Z
2
value 0.01174
scoring_system epss
scoring_elements 0.78704
published_at 2026-04-12T12:55:00Z
3
value 0.01174
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-13T12:55:00Z
4
value 0.01174
scoring_system epss
scoring_elements 0.78724
published_at 2026-04-16T12:55:00Z
5
value 0.01404
scoring_system epss
scoring_elements 0.80406
published_at 2026-04-02T12:55:00Z
6
value 0.01404
scoring_system epss
scoring_elements 0.80427
published_at 2026-04-04T12:55:00Z
7
value 0.01404
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-07T12:55:00Z
8
value 0.01404
scoring_system epss
scoring_elements 0.80446
published_at 2026-04-08T12:55:00Z
9
value 0.01404
scoring_system epss
scoring_elements 0.80456
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126877
reference_id 1126877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126877
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435961
reference_id 2435961
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435961
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/493
reference_id 493
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/493
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.26::el9
reference_id cpe:/a:redhat:openshift_devspaces:3.26::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.26::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
35
reference_url https://access.redhat.com/security/cve/CVE-2026-1761
reference_id CVE-2026-1761
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/security/cve/CVE-2026-1761
36
reference_url https://access.redhat.com/errata/RHSA-2026:1948
reference_id RHSA-2026:1948
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:1948
37
reference_url https://access.redhat.com/errata/RHSA-2026:2005
reference_id RHSA-2026:2005
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2005
38
reference_url https://access.redhat.com/errata/RHSA-2026:2006
reference_id RHSA-2026:2006
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2006
39
reference_url https://access.redhat.com/errata/RHSA-2026:2007
reference_id RHSA-2026:2007
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2007
40
reference_url https://access.redhat.com/errata/RHSA-2026:2008
reference_id RHSA-2026:2008
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2008
41
reference_url https://access.redhat.com/errata/RHSA-2026:2049
reference_id RHSA-2026:2049
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2049
42
reference_url https://access.redhat.com/errata/RHSA-2026:2182
reference_id RHSA-2026:2182
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2182
43
reference_url https://access.redhat.com/errata/RHSA-2026:2214
reference_id RHSA-2026:2214
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2214
44
reference_url https://access.redhat.com/errata/RHSA-2026:2215
reference_id RHSA-2026:2215
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2215
45
reference_url https://access.redhat.com/errata/RHSA-2026:2216
reference_id RHSA-2026:2216
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2216
46
reference_url https://access.redhat.com/errata/RHSA-2026:2396
reference_id RHSA-2026:2396
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2396
47
reference_url https://access.redhat.com/errata/RHSA-2026:2402
reference_id RHSA-2026:2402
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2402
48
reference_url https://access.redhat.com/errata/RHSA-2026:2410
reference_id RHSA-2026:2410
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2410
49
reference_url https://access.redhat.com/errata/RHSA-2026:2512
reference_id RHSA-2026:2512
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2512
50
reference_url https://access.redhat.com/errata/RHSA-2026:2513
reference_id RHSA-2026:2513
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2513
51
reference_url https://access.redhat.com/errata/RHSA-2026:2514
reference_id RHSA-2026:2514
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2514
52
reference_url https://access.redhat.com/errata/RHSA-2026:2528
reference_id RHSA-2026:2528
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2528
53
reference_url https://access.redhat.com/errata/RHSA-2026:2529
reference_id RHSA-2026:2529
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2529
54
reference_url https://access.redhat.com/errata/RHSA-2026:2628
reference_id RHSA-2026:2628
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2628
55
reference_url https://access.redhat.com/errata/RHSA-2026:2844
reference_id RHSA-2026:2844
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2844
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1761
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka6q-xta6-ukdp
9
url VCID-mxjn-d8v7-8ubc
vulnerability_id VCID-mxjn-d8v7-8ubc
summary libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12105.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-12105
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20197
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20356
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20309
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20263
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20204
published_at 2026-04-13T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20196
published_at 2026-04-16T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.202
published_at 2026-04-18T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20417
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20142
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20282
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-12105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118783
reference_id 1118783
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118783
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2405992
reference_id 2405992
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2405992
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
reference_id 481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/481
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
12
reference_url https://access.redhat.com/security/cve/CVE-2025-12105
reference_id CVE-2025-12105
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/security/cve/CVE-2025-12105
13
reference_url https://access.redhat.com/errata/RHSA-2025:23139
reference_id RHSA-2025:23139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/errata/RHSA-2025:23139
14
reference_url https://access.redhat.com/errata/RHSA-2025:23437
reference_id RHSA-2025:23437
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-23T14:54:27Z/
url https://access.redhat.com/errata/RHSA-2025:23437
15
reference_url https://usn.ubuntu.com/7932-1/
reference_id USN-7932-1
reference_type
scores
url https://usn.ubuntu.com/7932-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-6?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-6%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-12105
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxjn-d8v7-8ubc
10
url VCID-nbx2-3qh6-tqa3
vulnerability_id VCID-nbx2-3qh6-tqa3
summary libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14523.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14523.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14523
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04291
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04312
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04323
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04355
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04371
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04364
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-18T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05607
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05729
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05614
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14523
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122667
reference_id 1122667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122667
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421349
reference_id 2421349
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2421349
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
reference_id 472
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
34
reference_url https://access.redhat.com/security/cve/CVE-2025-14523
reference_id CVE-2025-14523
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/security/cve/CVE-2025-14523
35
reference_url https://access.redhat.com/errata/RHSA-2026:0421
reference_id RHSA-2026:0421
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0421
36
reference_url https://access.redhat.com/errata/RHSA-2026:0422
reference_id RHSA-2026:0422
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0422
37
reference_url https://access.redhat.com/errata/RHSA-2026:0423
reference_id RHSA-2026:0423
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0423
38
reference_url https://access.redhat.com/errata/RHSA-2026:0836
reference_id RHSA-2026:0836
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0836
39
reference_url https://access.redhat.com/errata/RHSA-2026:0867
reference_id RHSA-2026:0867
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0867
40
reference_url https://access.redhat.com/errata/RHSA-2026:0868
reference_id RHSA-2026:0868
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0868
41
reference_url https://access.redhat.com/errata/RHSA-2026:0905
reference_id RHSA-2026:0905
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0905
42
reference_url https://access.redhat.com/errata/RHSA-2026:0906
reference_id RHSA-2026:0906
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0906
43
reference_url https://access.redhat.com/errata/RHSA-2026:0907
reference_id RHSA-2026:0907
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0907
44
reference_url https://access.redhat.com/errata/RHSA-2026:0908
reference_id RHSA-2026:0908
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0908
45
reference_url https://access.redhat.com/errata/RHSA-2026:0909
reference_id RHSA-2026:0909
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0909
46
reference_url https://access.redhat.com/errata/RHSA-2026:0911
reference_id RHSA-2026:0911
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0911
47
reference_url https://access.redhat.com/errata/RHSA-2026:0925
reference_id RHSA-2026:0925
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0925
48
reference_url https://access.redhat.com/errata/RHSA-2026:1509
reference_id RHSA-2026:1509
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1509
49
reference_url https://access.redhat.com/errata/RHSA-2026:1569
reference_id RHSA-2026:1569
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1569
50
reference_url https://access.redhat.com/errata/RHSA-2026:1570
reference_id RHSA-2026:1570
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1570
51
reference_url https://access.redhat.com/errata/RHSA-2026:1571
reference_id RHSA-2026:1571
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1571
52
reference_url https://access.redhat.com/errata/RHSA-2026:1572
reference_id RHSA-2026:1572
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1572
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-7?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-7%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-14523
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbx2-3qh6-tqa3
11
url VCID-nu2x-tpra-4few
vulnerability_id VCID-nu2x-tpra-4few
summary libsoup: libsoup: HTTP header injection or response splitting via CRLF injection in Content-Disposition header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1536.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1536
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29215
published_at 2026-04-04T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-02T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.2997
published_at 2026-04-21T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.30111
published_at 2026-04-11T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.30067
published_at 2026-04-12T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30018
published_at 2026-04-13T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.30034
published_at 2026-04-16T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.30013
published_at 2026-04-18T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.30011
published_at 2026-04-07T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.30071
published_at 2026-04-08T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.30106
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126627
reference_id 1126627
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126627
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433834
reference_id 2433834
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433834
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/486
reference_id 486
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/486
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1536
reference_id CVE-2026-1536
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://access.redhat.com/security/cve/CVE-2026-1536
13
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1536
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu2x-tpra-4few
12
url VCID-rd74-1427-eybf
vulnerability_id VCID-rd74-1427-eybf
summary libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
reference_id
reference_type
scores
0
value 0.00986
scoring_system epss
scoring_elements 0.76778
published_at 2026-04-02T12:55:00Z
1
value 0.00986
scoring_system epss
scoring_elements 0.76837
published_at 2026-04-12T12:55:00Z
2
value 0.00986
scoring_system epss
scoring_elements 0.76831
published_at 2026-04-13T12:55:00Z
3
value 0.00986
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-16T12:55:00Z
4
value 0.00986
scoring_system epss
scoring_elements 0.7688
published_at 2026-04-18T12:55:00Z
5
value 0.00986
scoring_system epss
scoring_elements 0.76871
published_at 2026-04-21T12:55:00Z
6
value 0.00986
scoring_system epss
scoring_elements 0.76807
published_at 2026-04-04T12:55:00Z
7
value 0.00986
scoring_system epss
scoring_elements 0.76787
published_at 2026-04-07T12:55:00Z
8
value 0.00986
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-08T12:55:00Z
9
value 0.00986
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-09T12:55:00Z
10
value 0.00986
scoring_system epss
scoring_elements 0.76858
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4948
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
reference_id 1106204
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
reference_id 1106337
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106337
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
reference_id 2367183
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2367183
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
reference_id 449
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
29
reference_url https://access.redhat.com/security/cve/CVE-2025-4948
reference_id CVE-2025-4948
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/security/cve/CVE-2025-4948
30
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:21657
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8128
reference_id RHSA-2025:8128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8128
33
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8132
34
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8139
35
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8140
36
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8252
37
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8480
38
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8481
39
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8482
40
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:8663
41
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-19T16:53:09Z/
url https://access.redhat.com/errata/RHSA-2025:9179
42
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-4948
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rd74-1427-eybf
13
url VCID-sabm-gujq-j3fb
vulnerability_id VCID-sabm-gujq-j3fb
summary libsoup: Null pointer dereference in libsoup may lead to Denial Of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49611
published_at 2026-04-21T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49578
published_at 2026-04-02T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49596
published_at 2026-04-13T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49643
published_at 2026-04-16T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49641
published_at 2026-04-18T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49605
published_at 2026-04-04T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49557
published_at 2026-04-07T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49612
published_at 2026-04-08T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49606
published_at 2026-04-09T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49623
published_at 2026-04-11T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49594
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
reference_id 1105887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105887
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
reference_id 1107757
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107757
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
reference_id 2366513
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2366513
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-4476
reference_id CVE-2025-4476
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-16T18:08:10Z/
url https://access.redhat.com/security/cve/CVE-2025-4476
13
reference_url https://usn.ubuntu.com/7543-1/
reference_id USN-7543-1
reference_type
scores
url https://usn.ubuntu.com/7543-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-4476
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sabm-gujq-j3fb
14
url VCID-sccj-juvj-5ud5
vulnerability_id VCID-sccj-juvj-5ud5
summary libsoup: libsoup: HTTP header injection via specially crafted URLs when an HTTP proxy is configured
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1467.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1467
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.1833
published_at 2026-04-04T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18278
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18853
published_at 2026-04-21T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18971
published_at 2026-04-11T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18924
published_at 2026-04-12T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18873
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18825
published_at 2026-04-16T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18837
published_at 2026-04-18T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18831
published_at 2026-04-07T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.1891
published_at 2026-04-08T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126548
reference_id 1126548
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126548
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433174
reference_id 2433174
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433174
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/488
reference_id 488
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/488
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1467
reference_id CVE-2026-1467
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://access.redhat.com/security/cve/CVE-2026-1467
13
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1467
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sccj-juvj-5ud5
15
url VCID-tpky-j79x-pqd4
vulnerability_id VCID-tpky-j79x-pqd4
summary libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11021.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11021
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21248
published_at 2026-04-21T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22128
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22112
published_at 2026-04-11T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22071
published_at 2026-04-12T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22011
published_at 2026-04-13T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22009
published_at 2026-04-16T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-18T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22177
published_at 2026-04-04T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.2196
published_at 2026-04-07T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22041
published_at 2026-04-08T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.22096
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11021
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116469
reference_id 1116469
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116469
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2399627
reference_id 2399627
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2399627
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/459
reference_id 459
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/459
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
30
reference_url https://access.redhat.com/security/cve/CVE-2025-11021
reference_id CVE-2025-11021
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/security/cve/CVE-2025-11021
31
reference_url https://access.redhat.com/errata/RHSA-2025:18183
reference_id RHSA-2025:18183
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:18183
32
reference_url https://access.redhat.com/errata/RHSA-2025:19713
reference_id RHSA-2025:19713
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:19713
33
reference_url https://access.redhat.com/errata/RHSA-2025:19714
reference_id RHSA-2025:19714
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:19714
34
reference_url https://access.redhat.com/errata/RHSA-2025:20959
reference_id RHSA-2025:20959
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:20959
35
reference_url https://access.redhat.com/errata/RHSA-2025:21032
reference_id RHSA-2025:21032
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21032
36
reference_url https://access.redhat.com/errata/RHSA-2025:21655
reference_id RHSA-2025:21655
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21655
37
reference_url https://access.redhat.com/errata/RHSA-2025:21656
reference_id RHSA-2025:21656
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21656
38
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21657
39
reference_url https://access.redhat.com/errata/RHSA-2025:21664
reference_id RHSA-2025:21664
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21664
40
reference_url https://access.redhat.com/errata/RHSA-2025:21665
reference_id RHSA-2025:21665
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21665
41
reference_url https://access.redhat.com/errata/RHSA-2025:21666
reference_id RHSA-2025:21666
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21666
42
reference_url https://access.redhat.com/errata/RHSA-2025:21772
reference_id RHSA-2025:21772
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:21772
43
reference_url https://access.redhat.com/errata/RHSA-2025:22013
reference_id RHSA-2025:22013
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-26T15:34:18Z/
url https://access.redhat.com/errata/RHSA-2025:22013
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-5?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-5%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-11021
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpky-j79x-pqd4
16
url VCID-v11f-c1ed-j7d1
vulnerability_id VCID-v11f-c1ed-j7d1
summary libsoup: Denial of service on libsoup through HTTP/2 server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32908.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32908.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32908
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57398
published_at 2026-04-18T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.5735
published_at 2026-04-02T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57396
published_at 2026-04-12T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57376
published_at 2026-04-21T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57402
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57373
published_at 2026-04-04T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57349
published_at 2026-04-07T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.574
published_at 2026-04-08T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57403
published_at 2026-04-09T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57418
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32908
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103265
reference_id 1103265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103265
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359343
reference_id 2359343
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359343
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2025-32908
reference_id CVE-2025-32908
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32908
11
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:12:19Z/
url https://access.redhat.com/errata/RHSA-2025:7505
12
reference_url https://usn.ubuntu.com/7543-1/
reference_id USN-7543-1
reference_type
scores
url https://usn.ubuntu.com/7543-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32908
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v11f-c1ed-j7d1
17
url VCID-vsry-jr8n-zba8
vulnerability_id VCID-vsry-jr8n-zba8
summary libsoup: libsoup: Buffer overread due to integer underflow when handling zero-length resources
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2369.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2369
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.15026
published_at 2026-04-04T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14949
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14969
published_at 2026-04-09T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14934
published_at 2026-04-11T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14896
published_at 2026-04-12T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14837
published_at 2026-04-13T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14733
published_at 2026-04-16T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14741
published_at 2026-04-18T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14829
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14918
published_at 2026-04-08T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.1639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2369
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127843
reference_id 1127843
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127843
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439091
reference_id 2439091
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-19T14:42:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2439091
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/498
reference_id 498
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-19T14:42:24Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/498
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-2369
reference_id CVE-2026-2369
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-19T14:42:24Z/
url https://access.redhat.com/security/cve/CVE-2026-2369
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-2369
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsry-jr8n-zba8
18
url VCID-yx68-81fu-ffar
vulnerability_id VCID-yx68-81fu-ffar
summary libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32914.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66829
published_at 2026-04-02T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.66896
published_at 2026-04-16T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.6691
published_at 2026-04-18T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66892
published_at 2026-04-21T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.66854
published_at 2026-04-04T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66827
published_at 2026-04-07T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-08T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-09T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66909
published_at 2026-04-11T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-12T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66863
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32914
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
reference_id 1103267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103267
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
reference_id 1103512
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103512
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
reference_id 2359358
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359358
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-32914
reference_id CVE-2025-32914
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/security/cve/CVE-2025-32914
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:7505
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:05:22Z/
url https://access.redhat.com/errata/RHSA-2025:9179
41
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
42
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
43
reference_url https://usn.ubuntu.com/7643-1/
reference_id USN-7643-1
reference_type
scores
url https://usn.ubuntu.com/7643-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32914
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx68-81fu-ffar
19
url VCID-zhp7-2ks9-m7es
vulnerability_id VCID-zhp7-2ks9-m7es
summary libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32913.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-21T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.76868
published_at 2026-04-13T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76909
published_at 2026-04-16T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-18T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76843
published_at 2026-04-04T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-07T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76855
published_at 2026-04-08T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-09T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.76894
published_at 2026-04-11T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.76873
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32913
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
reference_id 2359357
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359357
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32913
reference_id CVE-2025-32913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/security/cve/CVE-2025-32913
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T13:54:02Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32913
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhp7-2ks9-m7es
Fixing_vulnerabilities
0
url VCID-1sfd-nkd4-5fej
vulnerability_id VCID-1sfd-nkd4-5fej
summary libsoup: Segmentation fault when parsing malformed data URI
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32051.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32051
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-02T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61671
published_at 2026-04-18T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61644
published_at 2026-04-12T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61624
published_at 2026-04-13T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61665
published_at 2026-04-16T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.616
published_at 2026-04-04T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61571
published_at 2026-04-07T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61619
published_at 2026-04-08T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.61633
published_at 2026-04-09T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32051
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357068
reference_id 2357068
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:46:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357068
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2025-32051
reference_id CVE-2025-32051
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:46:14Z/
url https://access.redhat.com/security/cve/CVE-2025-32051
10
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.1-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32051
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1sfd-nkd4-5fej
1
url VCID-24tr-cene-gfch
vulnerability_id VCID-24tr-cene-gfch
summary libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69774
published_at 2026-04-02T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69864
published_at 2026-04-16T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69874
published_at 2026-04-18T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69856
published_at 2026-04-21T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69789
published_at 2026-04-04T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69765
published_at 2026-04-07T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69814
published_at 2026-04-08T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69829
published_at 2026-04-09T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69852
published_at 2026-04-11T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69837
published_at 2026-04-12T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69822
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
reference_id 1103515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103515
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
reference_id 2359355
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359355
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32911
reference_id CVE-2025-32911
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/security/cve/CVE-2025-32911
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:8292
44
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:57:21Z/
url https://access.redhat.com/errata/RHSA-2025:9179
45
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
46
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32911
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24tr-cene-gfch
2
url VCID-4m39-v7d7-1ba7
vulnerability_id VCID-4m39-v7d7-1ba7
summary libsoup: Integer overflow in append_param_quoted
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75417
published_at 2026-04-21T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.7542
published_at 2026-04-16T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75427
published_at 2026-04-18T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75327
published_at 2026-04-02T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75359
published_at 2026-04-04T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75392
published_at 2026-04-09T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75379
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
reference_id 1102212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102212
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
reference_id 2357067
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357067
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32050
reference_id CVE-2025-32050
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/security/cve/CVE-2025-32050
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:56:24Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.1-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32050
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m39-v7d7-1ba7
3
url VCID-6skx-v6sg-53gq
vulnerability_id VCID-6skx-v6sg-53gq
summary libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
reference_id
reference_type
scores
0
value 0.02145
scoring_system epss
scoring_elements 0.84169
published_at 2026-04-02T12:55:00Z
1
value 0.02145
scoring_system epss
scoring_elements 0.84228
published_at 2026-04-12T12:55:00Z
2
value 0.02145
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-13T12:55:00Z
3
value 0.02145
scoring_system epss
scoring_elements 0.84246
published_at 2026-04-16T12:55:00Z
4
value 0.02145
scoring_system epss
scoring_elements 0.84247
published_at 2026-04-18T12:55:00Z
5
value 0.02145
scoring_system epss
scoring_elements 0.84251
published_at 2026-04-21T12:55:00Z
6
value 0.02145
scoring_system epss
scoring_elements 0.84187
published_at 2026-04-04T12:55:00Z
7
value 0.02145
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-07T12:55:00Z
8
value 0.02145
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-08T12:55:00Z
9
value 0.02145
scoring_system epss
scoring_elements 0.84216
published_at 2026-04-09T12:55:00Z
10
value 0.02145
scoring_system epss
scoring_elements 0.84234
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
reference_id 1102208
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102208
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
reference_id 2354669
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2354669
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
reference_id 422
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/422
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-2784
reference_id CVE-2025-2784
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/security/cve/CVE-2025-2784
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:7505
31
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8126
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T13:36:03Z/
url https://access.redhat.com/errata/RHSA-2025:9179
41
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
42
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-2784
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6skx-v6sg-53gq
4
url VCID-athp-xk5g-jbhu
vulnerability_id VCID-athp-xk5g-jbhu
summary libsoup: NULL Pointer Dereference on libsoup through function "sniff_mp4" in soup-content-sniffer.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32909.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66916
published_at 2026-04-04T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-12T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66926
published_at 2026-04-13T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-16T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66973
published_at 2026-04-18T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66938
published_at 2026-04-08T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-09T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66971
published_at 2026-04-11T12:55:00Z
9
value 0.00628
scoring_system epss
scoring_elements 0.70268
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32909
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32909
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
reference_id 1103517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103517
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
reference_id 2359353
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359353
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32909
reference_id CVE-2025-32909
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/security/cve/CVE-2025-32909
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:33:27Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32909
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-athp-xk5g-jbhu
5
url VCID-f481-8mb7-dbed
vulnerability_id VCID-f481-8mb7-dbed
summary libsoup: Null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.64141
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32910
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
reference_id 2359354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359354
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2025-32910
reference_id CVE-2025-32910
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/security/cve/CVE-2025-32910
13
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:54:36Z/
url https://access.redhat.com/errata/RHSA-2025:8292
14
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32910
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f481-8mb7-dbed
6
url VCID-htuv-qv35-gycj
vulnerability_id VCID-htuv-qv35-gycj
summary libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46420.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46420
reference_id
reference_type
scores
0
value 0.01098
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-21T12:55:00Z
1
value 0.01098
scoring_system epss
scoring_elements 0.78022
published_at 2026-04-12T12:55:00Z
2
value 0.01098
scoring_system epss
scoring_elements 0.7802
published_at 2026-04-13T12:55:00Z
3
value 0.01098
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-16T12:55:00Z
4
value 0.01098
scoring_system epss
scoring_elements 0.78054
published_at 2026-04-18T12:55:00Z
5
value 0.01098
scoring_system epss
scoring_elements 0.7797
published_at 2026-04-02T12:55:00Z
6
value 0.01098
scoring_system epss
scoring_elements 0.77999
published_at 2026-04-04T12:55:00Z
7
value 0.01098
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-07T12:55:00Z
8
value 0.01098
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-08T12:55:00Z
9
value 0.01098
scoring_system epss
scoring_elements 0.78012
published_at 2026-04-09T12:55:00Z
10
value 0.01098
scoring_system epss
scoring_elements 0.78039
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104055
reference_id 1104055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104055
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361963
reference_id 2361963
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2361963
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/438
reference_id 438
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/438
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-46420
reference_id CVE-2025-46420
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/security/cve/CVE-2025-46420
33
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4439
34
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4440
35
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4508
36
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4538
37
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4560
38
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4568
39
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4609
40
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4624
41
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:7436
42
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
43
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-46420
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htuv-qv35-gycj
7
url VCID-k9bu-zasm-vfgr
vulnerability_id VCID-k9bu-zasm-vfgr
summary libsoup: NULL pointer dereference in client when server omits the "nonce" parameter in an Unauthorized response with Digest authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59615
published_at 2026-04-04T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.5959
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59652
published_at 2026-04-12T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-13T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59665
published_at 2026-04-16T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-18T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59584
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59669
published_at 2026-04-11T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.64141
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32912
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
reference_id 1103516
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103516
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
reference_id 2359356
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359356
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-32912
reference_id CVE-2025-32912
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/security/cve/CVE-2025-32912
12
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:32:52Z/
url https://access.redhat.com/errata/RHSA-2025:7505
13
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
14
reference_url https://usn.ubuntu.com/7490-2/
reference_id USN-7490-2
reference_type
scores
url https://usn.ubuntu.com/7490-2/
15
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32912
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9bu-zasm-vfgr
8
url VCID-ku6w-4wsv-qbe4
vulnerability_id VCID-ku6w-4wsv-qbe4
summary libsoup: Out of bounds reads in soup_headers_parse_request()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
reference_id
reference_type
scores
0
value 0.00795
scoring_system epss
scoring_elements 0.74012
published_at 2026-04-21T12:55:00Z
1
value 0.00795
scoring_system epss
scoring_elements 0.73929
published_at 2026-04-02T12:55:00Z
2
value 0.00795
scoring_system epss
scoring_elements 0.73971
published_at 2026-04-13T12:55:00Z
3
value 0.00795
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-16T12:55:00Z
4
value 0.00795
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-18T12:55:00Z
5
value 0.00795
scoring_system epss
scoring_elements 0.73954
published_at 2026-04-04T12:55:00Z
6
value 0.00795
scoring_system epss
scoring_elements 0.73926
published_at 2026-04-07T12:55:00Z
7
value 0.00795
scoring_system epss
scoring_elements 0.7396
published_at 2026-04-08T12:55:00Z
8
value 0.00795
scoring_system epss
scoring_elements 0.73974
published_at 2026-04-09T12:55:00Z
9
value 0.00795
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-11T12:55:00Z
10
value 0.00795
scoring_system epss
scoring_elements 0.73979
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
reference_id 1103521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103521
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
reference_id 2359341
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359341
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-32906
reference_id CVE-2025-32906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/security/cve/CVE-2025-32906
33
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:21657
34
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4439
35
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4440
36
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4508
37
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4538
38
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4560
39
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4568
40
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4609
41
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:4624
42
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7436
43
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:7505
44
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:8292
45
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T14:13:49Z/
url https://access.redhat.com/errata/RHSA-2025:9179
46
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
47
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32906
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku6w-4wsv-qbe4
9
url VCID-su51-s55e-hqdh
vulnerability_id VCID-su51-s55e-hqdh
summary libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46421.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46421
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67739
published_at 2026-04-21T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67758
published_at 2026-04-18T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.67743
published_at 2026-04-12T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6771
published_at 2026-04-13T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67745
published_at 2026-04-16T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67667
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67688
published_at 2026-04-04T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67668
published_at 2026-04-07T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.6772
published_at 2026-04-08T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67734
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104054
reference_id 1104054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104054
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361962
reference_id 2361962
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2361962
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/439
reference_id 439
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/439
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-46421
reference_id CVE-2025-46421
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/security/cve/CVE-2025-46421
33
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4439
34
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4440
35
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4508
36
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4538
37
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4560
38
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4568
39
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4609
40
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:4624
41
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:7436
42
reference_url https://access.redhat.com/errata/RHSA-2025:7505
reference_id RHSA-2025:7505
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:12:43Z/
url https://access.redhat.com/errata/RHSA-2025:7505
43
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
44
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-46421
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-su51-s55e-hqdh
10
url VCID-svba-hf1d-y7ez
vulnerability_id VCID-svba-hf1d-y7ez
summary libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58632
published_at 2026-04-21T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.58581
published_at 2026-04-07T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58633
published_at 2026-04-08T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.5864
published_at 2026-04-09T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.58656
published_at 2026-04-18T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58637
published_at 2026-04-12T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58617
published_at 2026-04-13T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58651
published_at 2026-04-16T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.5859
published_at 2026-04-02T12:55:00Z
9
value 0.00366
scoring_system epss
scoring_elements 0.58611
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
reference_id 1088812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088812
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
reference_id 2325284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325284
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
reference_id 377
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/377
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
reference_id 402
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/402
8
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:37:22Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
9
reference_url https://access.redhat.com/errata/RHSA-2024:9501
reference_id RHSA-2024:9501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9501
10
reference_url https://access.redhat.com/errata/RHSA-2024:9524
reference_id RHSA-2024:9524
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9524
11
reference_url https://access.redhat.com/errata/RHSA-2024:9525
reference_id RHSA-2024:9525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9525
12
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
13
reference_url https://access.redhat.com/errata/RHSA-2024:9566
reference_id RHSA-2024:9566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9566
14
reference_url https://access.redhat.com/errata/RHSA-2024:9570
reference_id RHSA-2024:9570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9570
15
reference_url https://access.redhat.com/errata/RHSA-2024:9572
reference_id RHSA-2024:9572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9572
16
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
17
reference_url https://access.redhat.com/errata/RHSA-2024:9576
reference_id RHSA-2024:9576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9576
18
reference_url https://access.redhat.com/errata/RHSA-2024:9654
reference_id RHSA-2024:9654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9654
19
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
20
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.5.2-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.5.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.5.2-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2024-52530
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svba-hf1d-y7ez
11
url VCID-uk2y-997k-4qat
vulnerability_id VCID-uk2y-997k-4qat
summary libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35515
published_at 2026-04-21T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35617
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35642
published_at 2026-04-04T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35524
published_at 2026-04-07T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.3557
published_at 2026-04-08T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35594
published_at 2026-04-09T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35604
published_at 2026-04-11T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.3556
published_at 2026-04-12T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-13T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35576
published_at 2026-04-16T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35566
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
reference_id 1087417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087417
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
reference_id 1089240
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089240
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
reference_id 2325277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325277
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
reference_id 407
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
reference_id 407#note_2316401
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407#note_2316401
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2025:0791
reference_id RHSA-2025:0791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0791
11
reference_url https://access.redhat.com/errata/RHSA-2025:0838
reference_id RHSA-2025:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0838
12
reference_url https://access.redhat.com/errata/RHSA-2025:0847
reference_id RHSA-2025:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0847
13
reference_url https://access.redhat.com/errata/RHSA-2025:0848
reference_id RHSA-2025:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0848
14
reference_url https://access.redhat.com/errata/RHSA-2025:0882
reference_id RHSA-2025:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0882
15
reference_url https://access.redhat.com/errata/RHSA-2025:0889
reference_id RHSA-2025:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0889
16
reference_url https://access.redhat.com/errata/RHSA-2025:0903
reference_id RHSA-2025:0903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0903
17
reference_url https://access.redhat.com/errata/RHSA-2025:0949
reference_id RHSA-2025:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0949
18
reference_url https://access.redhat.com/errata/RHSA-2025:1047
reference_id RHSA-2025:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1047
19
reference_url https://access.redhat.com/errata/RHSA-2025:1075
reference_id RHSA-2025:1075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1075
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_id using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:09:47Z/
url https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
22
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
23
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
24
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.0-4?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.0-4%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2024-52531
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uk2y-997k-4qat
12
url VCID-v9pv-qh9a-97g9
vulnerability_id VCID-v9pv-qh9a-97g9
summary libsoup: infinite loop while reading websocket data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42427
published_at 2026-04-21T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42508
published_at 2026-04-08T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42518
published_at 2026-04-09T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.4254
published_at 2026-04-11T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42503
published_at 2026-04-12T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42472
published_at 2026-04-13T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42523
published_at 2026-04-16T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42498
published_at 2026-04-18T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42491
published_at 2026-04-02T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42519
published_at 2026-04-04T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42457
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
reference_id 1087416
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087416
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
reference_id 1089238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089238
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
reference_id 2325276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325276
7
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
reference_id 391
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/391
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
reference_id 410
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/410
9
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:16:48Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
10
reference_url https://access.redhat.com/errata/RHSA-2024:9559
reference_id RHSA-2024:9559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9559
11
reference_url https://access.redhat.com/errata/RHSA-2024:9573
reference_id RHSA-2024:9573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9573
12
reference_url https://usn.ubuntu.com/7126-1/
reference_id USN-7126-1
reference_type
scores
url https://usn.ubuntu.com/7126-1/
13
reference_url https://usn.ubuntu.com/7127-1/
reference_id USN-7127-1
reference_type
scores
url https://usn.ubuntu.com/7127-1/
14
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.0-4?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.0-4%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2024-52532
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9pv-qh9a-97g9
13
url VCID-zrmu-bwfg-e3hp
vulnerability_id VCID-zrmu-bwfg-e3hp
summary libsoup: Heap buffer overflow in sniff_unknown()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-21T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32052
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
reference_id 1102214
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
reference_id 2357069
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357069
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32052
reference_id CVE-2025-32052
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/security/cve/CVE-2025-32052
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:44:39Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.1-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32052
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrmu-bwfg-e3hp
14
url VCID-zsdd-pzyb-nbdf
vulnerability_id VCID-zsdd-pzyb-nbdf
summary libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-21T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-16T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78221
published_at 2026-04-18T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78141
published_at 2026-04-02T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78154
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78186
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78195
published_at 2026-04-12T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
reference_id 1102215
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102215
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
reference_id 2357070
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357070
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
17
reference_url https://access.redhat.com/security/cve/CVE-2025-32053
reference_id CVE-2025-32053
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/security/cve/CVE-2025-32053
18
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4440
19
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4508
20
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4560
21
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:4568
22
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:7436
23
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:04:01Z/
url https://access.redhat.com/errata/RHSA-2025:8292
24
reference_url https://usn.ubuntu.com/7432-1/
reference_id USN-7432-1
reference_type
scores
url https://usn.ubuntu.com/7432-1/
25
reference_url https://usn.ubuntu.com/7565-1/
reference_id USN-7565-1
reference_type
scores
url https://usn.ubuntu.com/7565-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.1-1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2025-32053
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdd-pzyb-nbdf
Risk_score3.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie