Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-htuv-qv35-gycj
Summarylibsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c
Aliases
0
alias CVE-2025-46420
Fixed_packages
0
url pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1%3Fdistro=trixie
1
url pkg:deb/debian/libsoup2.4@2.74.3-10.1
purl pkg:deb/debian/libsoup2.4@2.74.3-10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7hhg-3u9v-nqfw
1
vulnerability VCID-9uua-rxjd-fkf6
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-sabm-gujq-j3fb
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-10.1
2
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libsoup3@3.2.3-0%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-6sbg-fgfs-43b6
4
vulnerability VCID-7hhg-3u9v-nqfw
5
vulnerability VCID-9uua-rxjd-fkf6
6
vulnerability VCID-cjwc-3fs8-17ef
7
vulnerability VCID-dnrq-3tff-nfc3
8
vulnerability VCID-ka6q-xta6-ukdp
9
vulnerability VCID-mxjn-d8v7-8ubc
10
vulnerability VCID-nbx2-3qh6-tqa3
11
vulnerability VCID-nu2x-tpra-4few
12
vulnerability VCID-rd74-1427-eybf
13
vulnerability VCID-sabm-gujq-j3fb
14
vulnerability VCID-sccj-juvj-5ud5
15
vulnerability VCID-tpky-j79x-pqd4
16
vulnerability VCID-v11f-c1ed-j7d1
17
vulnerability VCID-vsry-jr8n-zba8
18
vulnerability VCID-yx68-81fu-ffar
19
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.2.3-0%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.4-1%3Fdistro=trixie
5
url pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.5-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vz1-x5py-dkg5
1
vulnerability VCID-3zqd-pcvp-a7ed
2
vulnerability VCID-6sbg-fgfs-43b6
3
vulnerability VCID-cjwc-3fs8-17ef
4
vulnerability VCID-dnrq-3tff-nfc3
5
vulnerability VCID-ka6q-xta6-ukdp
6
vulnerability VCID-mxjn-d8v7-8ubc
7
vulnerability VCID-nbx2-3qh6-tqa3
8
vulnerability VCID-nu2x-tpra-4few
9
vulnerability VCID-sccj-juvj-5ud5
10
vulnerability VCID-tpky-j79x-pqd4
11
vulnerability VCID-vsry-jr8n-zba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.5-3%3Fdistro=trixie
6
url pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
purl pkg:deb/debian/libsoup3@3.6.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup3@3.6.6-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.72.0-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-htuv-qv35-gycj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2%3Fdistro=trixie
1
url pkg:deb/debian/libsoup2.4@2.72.0-2
purl pkg:deb/debian/libsoup2.4@2.72.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-svba-hf1d-y7ez
13
vulnerability VCID-uk2y-997k-4qat
14
vulnerability VCID-v9pv-qh9a-97g9
15
vulnerability VCID-yx68-81fu-ffar
16
vulnerability VCID-zhp7-2ks9-m7es
17
vulnerability VCID-zrmu-bwfg-e3hp
18
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.72.0-2
2
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
purl pkg:deb/debian/libsoup2.4@2.74.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-6skx-v6sg-53gq
3
vulnerability VCID-7hhg-3u9v-nqfw
4
vulnerability VCID-9uua-rxjd-fkf6
5
vulnerability VCID-athp-xk5g-jbhu
6
vulnerability VCID-f481-8mb7-dbed
7
vulnerability VCID-htuv-qv35-gycj
8
vulnerability VCID-k9bu-zasm-vfgr
9
vulnerability VCID-ku6w-4wsv-qbe4
10
vulnerability VCID-rd74-1427-eybf
11
vulnerability VCID-sabm-gujq-j3fb
12
vulnerability VCID-yx68-81fu-ffar
13
vulnerability VCID-zhp7-2ks9-m7es
14
vulnerability VCID-zrmu-bwfg-e3hp
15
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libsoup2.4@2.74.3-1%252Bdeb12u1
4
url pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=4
purl pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-htuv-qv35-gycj
2
vulnerability VCID-ku6w-4wsv-qbe4
3
vulnerability VCID-su51-s55e-hqdh
4
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-1.el8_2%3Farch=4
5
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=4
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-htuv-qv35-gycj
2
vulnerability VCID-ku6w-4wsv-qbe4
3
vulnerability VCID-su51-s55e-hqdh
4
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_4%3Farch=4
6
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=4
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-htuv-qv35-gycj
2
vulnerability VCID-ku6w-4wsv-qbe4
3
vulnerability VCID-su51-s55e-hqdh
4
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_6%3Farch=4
7
url pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=4
purl pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-htuv-qv35-gycj
3
vulnerability VCID-ku6w-4wsv-qbe4
4
vulnerability VCID-su51-s55e-hqdh
5
vulnerability VCID-zhp7-2ks9-m7es
6
vulnerability VCID-zrmu-bwfg-e3hp
7
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-3.el8_8%3Farch=4
8
url pkg:rpm/redhat/libsoup@2.62.3-8?arch=el8_10
purl pkg:rpm/redhat/libsoup@2.62.3-8?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-htuv-qv35-gycj
3
vulnerability VCID-ku6w-4wsv-qbe4
4
vulnerability VCID-su51-s55e-hqdh
5
vulnerability VCID-zhp7-2ks9-m7es
6
vulnerability VCID-zrmu-bwfg-e3hp
7
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-8%3Farch=el8_10
9
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=4
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4scr-ppqy-5ugf
2
vulnerability VCID-htuv-qv35-gycj
3
vulnerability VCID-ku6w-4wsv-qbe4
4
vulnerability VCID-su51-s55e-hqdh
5
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_0%3Farch=4
10
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=4
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-htuv-qv35-gycj
4
vulnerability VCID-ku6w-4wsv-qbe4
5
vulnerability VCID-su51-s55e-hqdh
6
vulnerability VCID-zhp7-2ks9-m7es
7
vulnerability VCID-zrmu-bwfg-e3hp
8
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_2%3Farch=4
11
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=4
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-htuv-qv35-gycj
4
vulnerability VCID-ku6w-4wsv-qbe4
5
vulnerability VCID-su51-s55e-hqdh
6
vulnerability VCID-zhp7-2ks9-m7es
7
vulnerability VCID-zrmu-bwfg-e3hp
8
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_4%3Farch=4
12
url pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=1
purl pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-4m39-v7d7-1ba7
2
vulnerability VCID-4scr-ppqy-5ugf
3
vulnerability VCID-htuv-qv35-gycj
4
vulnerability VCID-ku6w-4wsv-qbe4
5
vulnerability VCID-su51-s55e-hqdh
6
vulnerability VCID-zhp7-2ks9-m7es
7
vulnerability VCID-zrmu-bwfg-e3hp
8
vulnerability VCID-zsdd-pzyb-nbdf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-10.el9_6%3Farch=1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46420.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46420
reference_id
reference_type
scores
0
value 0.01098
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-21T12:55:00Z
1
value 0.01098
scoring_system epss
scoring_elements 0.78022
published_at 2026-04-12T12:55:00Z
2
value 0.01098
scoring_system epss
scoring_elements 0.7802
published_at 2026-04-13T12:55:00Z
3
value 0.01098
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-16T12:55:00Z
4
value 0.01098
scoring_system epss
scoring_elements 0.78054
published_at 2026-04-18T12:55:00Z
5
value 0.01098
scoring_system epss
scoring_elements 0.7797
published_at 2026-04-02T12:55:00Z
6
value 0.01098
scoring_system epss
scoring_elements 0.77999
published_at 2026-04-04T12:55:00Z
7
value 0.01098
scoring_system epss
scoring_elements 0.77981
published_at 2026-04-07T12:55:00Z
8
value 0.01098
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-08T12:55:00Z
9
value 0.01098
scoring_system epss
scoring_elements 0.78012
published_at 2026-04-09T12:55:00Z
10
value 0.01098
scoring_system epss
scoring_elements 0.78039
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104055
reference_id 1104055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104055
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2361963
reference_id 2361963
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2361963
6
reference_url https://gitlab.gnome.org/GNOME/libsoup/-/issues/438
reference_id 438
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://gitlab.gnome.org/GNOME/libsoup/-/issues/438
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-46420
reference_id CVE-2025-46420
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/security/cve/CVE-2025-46420
33
reference_url https://access.redhat.com/errata/RHSA-2025:4439
reference_id RHSA-2025:4439
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4439
34
reference_url https://access.redhat.com/errata/RHSA-2025:4440
reference_id RHSA-2025:4440
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4440
35
reference_url https://access.redhat.com/errata/RHSA-2025:4508
reference_id RHSA-2025:4508
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4508
36
reference_url https://access.redhat.com/errata/RHSA-2025:4538
reference_id RHSA-2025:4538
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4538
37
reference_url https://access.redhat.com/errata/RHSA-2025:4560
reference_id RHSA-2025:4560
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4560
38
reference_url https://access.redhat.com/errata/RHSA-2025:4568
reference_id RHSA-2025:4568
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4568
39
reference_url https://access.redhat.com/errata/RHSA-2025:4609
reference_id RHSA-2025:4609
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4609
40
reference_url https://access.redhat.com/errata/RHSA-2025:4624
reference_id RHSA-2025:4624
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:4624
41
reference_url https://access.redhat.com/errata/RHSA-2025:7436
reference_id RHSA-2025:7436
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:14:47Z/
url https://access.redhat.com/errata/RHSA-2025:7436
42
reference_url https://usn.ubuntu.com/7490-1/
reference_id USN-7490-1
reference_type
scores
url https://usn.ubuntu.com/7490-1/
43
reference_url https://usn.ubuntu.com/7490-3/
reference_id USN-7490-3
reference_type
scores
url https://usn.ubuntu.com/7490-3/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_score6.5 - 6.5
Exploitability0.5
Weighted_severity5.9
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-htuv-qv35-gycj