Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-nbx2-3qh6-tqa3
Summarylibsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins)
Aliases
0
alias CVE-2025-14523
Fixed_packages
0
url pkg:deb/debian/libsoup3@3.6.5-7?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-7%3Fdistro=trixie
1
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.6-1
purl pkg:deb/debian/libsoup3@3.6.6-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1
Affected_packages
0
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2
1
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.6.5-3
purl pkg:deb/debian/libsoup3@3.6.5-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3
4
url pkg:rpm/redhat/libsoup@2.62.2-10?arch=el7_9
purl pkg:rpm/redhat/libsoup@2.62.2-10?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.2-10%3Farch=el7_9
5
url pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=7
purl pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-1.el8_2%3Farch=7
6
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=7
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_4%3Farch=7
7
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=7
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_6%3Farch=7
8
url pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=7
purl pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-3.el8_8%3Farch=7
9
url pkg:rpm/redhat/libsoup@2.62.3-11?arch=el8_10
purl pkg:rpm/redhat/libsoup@2.62.3-11?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-11%3Farch=el8_10
10
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=8
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_0%3Farch=8
11
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=8
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_2%3Farch=8
12
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=8
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_4%3Farch=8
13
url pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=5
purl pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-10.el9_6%3Farch=5
14
url pkg:rpm/redhat/libsoup@2.72.0-12.el9_7?arch=3
purl pkg:rpm/redhat/libsoup@2.72.0-12.el9_7?arch=3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-12.el9_7%3Farch=3
15
url pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0?arch=11
purl pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0?arch=11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0%3Farch=11
16
url pkg:rpm/redhat/libsoup3@3.6.5-3.el10_1?arch=8
purl pkg:rpm/redhat/libsoup3@3.6.5-3.el10_1?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup3@3.6.5-3.el10_1%3Farch=8
17
url pkg:rpm/redhat/spice-client-win@8.10-6.el8_2?arch=1
purl pkg:rpm/redhat/spice-client-win@8.10-6.el8_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-client-win@8.10-6.el8_2%3Farch=1
18
url pkg:rpm/redhat/spice-client-win@8.10-6.el8_4?arch=1
purl pkg:rpm/redhat/spice-client-win@8.10-6.el8_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-client-win@8.10-6.el8_4%3Farch=1
19
url pkg:rpm/redhat/spice-client-win@8.10-6.el8_6?arch=1
purl pkg:rpm/redhat/spice-client-win@8.10-6.el8_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-client-win@8.10-6.el8_6%3Farch=1
20
url pkg:rpm/redhat/spice-client-win@8.10-6.el8_8?arch=1
purl pkg:rpm/redhat/spice-client-win@8.10-6.el8_8?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-client-win@8.10-6.el8_8%3Farch=1
21
url pkg:rpm/redhat/spice-client-win@8.10-6.el8_10?arch=1
purl pkg:rpm/redhat/spice-client-win@8.10-6.el8_10?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nbx2-3qh6-tqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-client-win@8.10-6.el8_10%3Farch=1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14523.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14523.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14523
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04291
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04312
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04323
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04355
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04371
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04364
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05571
published_at 2026-04-18T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05607
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05729
published_at 2026-04-21T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05614
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14523
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122667
reference_id 1122667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122667
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421349
reference_id 2421349
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2421349
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
reference_id 472
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
34
reference_url https://access.redhat.com/security/cve/CVE-2025-14523
reference_id CVE-2025-14523
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/security/cve/CVE-2025-14523
35
reference_url https://access.redhat.com/errata/RHSA-2026:0421
reference_id RHSA-2026:0421
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0421
36
reference_url https://access.redhat.com/errata/RHSA-2026:0422
reference_id RHSA-2026:0422
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0422
37
reference_url https://access.redhat.com/errata/RHSA-2026:0423
reference_id RHSA-2026:0423
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0423
38
reference_url https://access.redhat.com/errata/RHSA-2026:0836
reference_id RHSA-2026:0836
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0836
39
reference_url https://access.redhat.com/errata/RHSA-2026:0867
reference_id RHSA-2026:0867
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0867
40
reference_url https://access.redhat.com/errata/RHSA-2026:0868
reference_id RHSA-2026:0868
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0868
41
reference_url https://access.redhat.com/errata/RHSA-2026:0905
reference_id RHSA-2026:0905
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0905
42
reference_url https://access.redhat.com/errata/RHSA-2026:0906
reference_id RHSA-2026:0906
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0906
43
reference_url https://access.redhat.com/errata/RHSA-2026:0907
reference_id RHSA-2026:0907
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0907
44
reference_url https://access.redhat.com/errata/RHSA-2026:0908
reference_id RHSA-2026:0908
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0908
45
reference_url https://access.redhat.com/errata/RHSA-2026:0909
reference_id RHSA-2026:0909
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0909
46
reference_url https://access.redhat.com/errata/RHSA-2026:0911
reference_id RHSA-2026:0911
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0911
47
reference_url https://access.redhat.com/errata/RHSA-2026:0925
reference_id RHSA-2026:0925
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:0925
48
reference_url https://access.redhat.com/errata/RHSA-2026:1509
reference_id RHSA-2026:1509
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1509
49
reference_url https://access.redhat.com/errata/RHSA-2026:1569
reference_id RHSA-2026:1569
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1569
50
reference_url https://access.redhat.com/errata/RHSA-2026:1570
reference_id RHSA-2026:1570
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1570
51
reference_url https://access.redhat.com/errata/RHSA-2026:1571
reference_id RHSA-2026:1571
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1571
52
reference_url https://access.redhat.com/errata/RHSA-2026:1572
reference_id RHSA-2026:1572
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:49:20Z/
url https://access.redhat.com/errata/RHSA-2026:1572
Weaknesses
0
cwe_id 444
name Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
description The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.
Exploits
Severity_range_score8.2 - 8.2
Exploitability0.5
Weighted_severity7.4
Risk_score3.7
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-nbx2-3qh6-tqa3