Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
Typedeb
Namespacedebian
Namelibsoup3
Version3.6.5-8
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.6.5-9
Latest_non_vulnerable_version3.6.6-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1vz1-x5py-dkg5
vulnerability_id VCID-1vz1-x5py-dkg5
summary A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1539.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1539
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18107
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18212
published_at 2026-04-09T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18217
published_at 2026-04-11T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18169
published_at 2026-04-12T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18118
published_at 2026-04-13T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-16T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18073
published_at 2026-04-18T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18156
published_at 2026-04-08T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-02T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22609
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1539
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126628
reference_id 1126628
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126628
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/489
reference_id 489
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:09:01Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/489
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2026-1539
reference_id CVE-2026-1539
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:09:01Z/
url https://access.redhat.com/security/cve/CVE-2026-1539
12
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1539
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vz1-x5py-dkg5
1
url VCID-3zqd-pcvp-a7ed
vulnerability_id VCID-3zqd-pcvp-a7ed
summary libsoup: SoupServer: Denial of Service via HTTP request smuggling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1760.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1760
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03586
published_at 2026-04-04T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03572
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03597
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03598
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0362
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03931
published_at 2026-04-12T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03902
published_at 2026-04-13T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03881
published_at 2026-04-16T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03891
published_at 2026-04-18T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04012
published_at 2026-04-21T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03948
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126876
reference_id 1126876
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126876
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435951
reference_id 2435951
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435951
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/475
reference_id 475
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/475
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1760
reference_id CVE-2026-1760
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:29:44Z/
url https://access.redhat.com/security/cve/CVE-2026-1760
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1760
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zqd-pcvp-a7ed
2
url VCID-cjwc-3fs8-17ef
vulnerability_id VCID-cjwc-3fs8-17ef
summary libsoup: libsoup: HTTP Request Smuggling via malformed chunk headers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1801.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1801
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0836
published_at 2026-04-12T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08343
published_at 2026-04-13T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08236
published_at 2026-04-16T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08222
published_at 2026-04-18T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11316
published_at 2026-04-02T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11376
published_at 2026-04-04T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1118
published_at 2026-04-07T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.1126
published_at 2026-04-08T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11315
published_at 2026-04-09T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.1132
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1801
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436315
reference_id 2436315
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2436315
5
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/481
reference_id 481
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/481
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2026-1801
reference_id CVE-2026-1801
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-03T20:40:42Z/
url https://access.redhat.com/security/cve/CVE-2026-1801
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1801
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjwc-3fs8-17ef
3
url VCID-ka6q-xta6-ukdp
vulnerability_id VCID-ka6q-xta6-ukdp
summary libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1761.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1761
reference_id
reference_type
scores
0
value 0.01174
scoring_system epss
scoring_elements 0.78718
published_at 2026-04-21T12:55:00Z
1
value 0.01174
scoring_system epss
scoring_elements 0.78722
published_at 2026-04-18T12:55:00Z
2
value 0.01174
scoring_system epss
scoring_elements 0.78704
published_at 2026-04-12T12:55:00Z
3
value 0.01174
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-13T12:55:00Z
4
value 0.01174
scoring_system epss
scoring_elements 0.78724
published_at 2026-04-16T12:55:00Z
5
value 0.01404
scoring_system epss
scoring_elements 0.80406
published_at 2026-04-02T12:55:00Z
6
value 0.01404
scoring_system epss
scoring_elements 0.80427
published_at 2026-04-04T12:55:00Z
7
value 0.01404
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-07T12:55:00Z
8
value 0.01404
scoring_system epss
scoring_elements 0.80446
published_at 2026-04-08T12:55:00Z
9
value 0.01404
scoring_system epss
scoring_elements 0.80456
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126877
reference_id 1126877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126877
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435961
reference_id 2435961
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435961
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/493
reference_id 493
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/493
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.26::el9
reference_id cpe:/a:redhat:openshift_devspaces:3.26::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.26::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
35
reference_url https://access.redhat.com/security/cve/CVE-2026-1761
reference_id CVE-2026-1761
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/security/cve/CVE-2026-1761
36
reference_url https://access.redhat.com/errata/RHSA-2026:1948
reference_id RHSA-2026:1948
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:1948
37
reference_url https://access.redhat.com/errata/RHSA-2026:2005
reference_id RHSA-2026:2005
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2005
38
reference_url https://access.redhat.com/errata/RHSA-2026:2006
reference_id RHSA-2026:2006
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2006
39
reference_url https://access.redhat.com/errata/RHSA-2026:2007
reference_id RHSA-2026:2007
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2007
40
reference_url https://access.redhat.com/errata/RHSA-2026:2008
reference_id RHSA-2026:2008
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2008
41
reference_url https://access.redhat.com/errata/RHSA-2026:2049
reference_id RHSA-2026:2049
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2049
42
reference_url https://access.redhat.com/errata/RHSA-2026:2182
reference_id RHSA-2026:2182
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2182
43
reference_url https://access.redhat.com/errata/RHSA-2026:2214
reference_id RHSA-2026:2214
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2214
44
reference_url https://access.redhat.com/errata/RHSA-2026:2215
reference_id RHSA-2026:2215
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2215
45
reference_url https://access.redhat.com/errata/RHSA-2026:2216
reference_id RHSA-2026:2216
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2216
46
reference_url https://access.redhat.com/errata/RHSA-2026:2396
reference_id RHSA-2026:2396
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2396
47
reference_url https://access.redhat.com/errata/RHSA-2026:2402
reference_id RHSA-2026:2402
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2402
48
reference_url https://access.redhat.com/errata/RHSA-2026:2410
reference_id RHSA-2026:2410
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2410
49
reference_url https://access.redhat.com/errata/RHSA-2026:2512
reference_id RHSA-2026:2512
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2512
50
reference_url https://access.redhat.com/errata/RHSA-2026:2513
reference_id RHSA-2026:2513
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2513
51
reference_url https://access.redhat.com/errata/RHSA-2026:2514
reference_id RHSA-2026:2514
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2514
52
reference_url https://access.redhat.com/errata/RHSA-2026:2528
reference_id RHSA-2026:2528
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2528
53
reference_url https://access.redhat.com/errata/RHSA-2026:2529
reference_id RHSA-2026:2529
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2529
54
reference_url https://access.redhat.com/errata/RHSA-2026:2628
reference_id RHSA-2026:2628
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2628
55
reference_url https://access.redhat.com/errata/RHSA-2026:2844
reference_id RHSA-2026:2844
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-02T17:30:09Z/
url https://access.redhat.com/errata/RHSA-2026:2844
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1761
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka6q-xta6-ukdp
4
url VCID-nu2x-tpra-4few
vulnerability_id VCID-nu2x-tpra-4few
summary libsoup: libsoup: HTTP header injection or response splitting via CRLF injection in Content-Disposition header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1536.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1536
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29215
published_at 2026-04-04T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-02T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.2997
published_at 2026-04-21T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.30111
published_at 2026-04-11T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.30067
published_at 2026-04-12T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30018
published_at 2026-04-13T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.30034
published_at 2026-04-16T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.30013
published_at 2026-04-18T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.30011
published_at 2026-04-07T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.30071
published_at 2026-04-08T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.30106
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126627
reference_id 1126627
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126627
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433834
reference_id 2433834
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433834
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/486
reference_id 486
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/486
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1536
reference_id CVE-2026-1536
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:10:03Z/
url https://access.redhat.com/security/cve/CVE-2026-1536
13
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1536
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu2x-tpra-4few
5
url VCID-sccj-juvj-5ud5
vulnerability_id VCID-sccj-juvj-5ud5
summary libsoup: libsoup: HTTP header injection via specially crafted URLs when an HTTP proxy is configured
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1467.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1467
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.1833
published_at 2026-04-04T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18278
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18853
published_at 2026-04-21T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18971
published_at 2026-04-11T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18924
published_at 2026-04-12T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18873
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18825
published_at 2026-04-16T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18837
published_at 2026-04-18T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18831
published_at 2026-04-07T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.1891
published_at 2026-04-08T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126548
reference_id 1126548
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126548
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433174
reference_id 2433174
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433174
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/488
reference_id 488
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/488
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1467
reference_id CVE-2026-1467
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:54:59Z/
url https://access.redhat.com/security/cve/CVE-2026-1467
13
reference_url https://usn.ubuntu.com/8020-1/
reference_id USN-8020-1
reference_type
scores
url https://usn.ubuntu.com/8020-1/
fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
aliases CVE-2026-1467
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sccj-juvj-5ud5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-8%3Fdistro=trixie