Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jj7w-5tgz-4kcr
Summarylibsoup: Denial of Service attack to websocket server
Aliases
0
alias CVE-2025-32049
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/libsoup@2.62.2-6?arch=el7_9
purl pkg:rpm/redhat/libsoup@2.62.2-6?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-6skx-v6sg-53gq
2
vulnerability VCID-jj7w-5tgz-4kcr
3
vulnerability VCID-ku6w-4wsv-qbe4
4
vulnerability VCID-rd74-1427-eybf
5
vulnerability VCID-yx68-81fu-ffar
6
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.2-6%3Farch=el7_9
1
url pkg:rpm/redhat/libsoup@2.62.2-9?arch=el7_9
purl pkg:rpm/redhat/libsoup@2.62.2-9?arch=el7_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24tr-cene-gfch
1
vulnerability VCID-6skx-v6sg-53gq
2
vulnerability VCID-7hhg-3u9v-nqfw
3
vulnerability VCID-jj7w-5tgz-4kcr
4
vulnerability VCID-ku6w-4wsv-qbe4
5
vulnerability VCID-rd74-1427-eybf
6
vulnerability VCID-tpky-j79x-pqd4
7
vulnerability VCID-yx68-81fu-ffar
8
vulnerability VCID-zhp7-2ks9-m7es
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.2-9%3Farch=el7_9
2
url pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=5
purl pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-1.el8_2%3Farch=5
3
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=5
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_4%3Farch=5
4
url pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=5
purl pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_6%3Farch=5
5
url pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=5
purl pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-3.el8_8%3Farch=5
6
url pkg:rpm/redhat/libsoup@2.62.3-9?arch=el8_10
purl pkg:rpm/redhat/libsoup@2.62.3-9?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-9%3Farch=el8_10
7
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=5
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_0%3Farch=5
8
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=5
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_2%3Farch=5
9
url pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=5
purl pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_4%3Farch=5
10
url pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=2
purl pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6skx-v6sg-53gq
1
vulnerability VCID-jj7w-5tgz-4kcr
2
vulnerability VCID-rd74-1427-eybf
3
vulnerability VCID-yx68-81fu-ffar
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-10.el9_6%3Farch=2
11
url pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0?arch=6
purl pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4scr-ppqy-5ugf
1
vulnerability VCID-e8ye-fsm9-2kcr
2
vulnerability VCID-jj7w-5tgz-4kcr
3
vulnerability VCID-rd74-1427-eybf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0%3Farch=6
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32049.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32049
reference_id
reference_type
scores
0
value 0.0156
scoring_system epss
scoring_elements 0.81516
published_at 2026-04-21T12:55:00Z
1
value 0.0156
scoring_system epss
scoring_elements 0.81421
published_at 2026-04-02T12:55:00Z
2
value 0.0156
scoring_system epss
scoring_elements 0.81476
published_at 2026-04-13T12:55:00Z
3
value 0.0156
scoring_system epss
scoring_elements 0.81513
published_at 2026-04-16T12:55:00Z
4
value 0.0156
scoring_system epss
scoring_elements 0.81514
published_at 2026-04-18T12:55:00Z
5
value 0.0156
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-04T12:55:00Z
6
value 0.0156
scoring_system epss
scoring_elements 0.81441
published_at 2026-04-07T12:55:00Z
7
value 0.0156
scoring_system epss
scoring_elements 0.81469
published_at 2026-04-08T12:55:00Z
8
value 0.0156
scoring_system epss
scoring_elements 0.81475
published_at 2026-04-09T12:55:00Z
9
value 0.0156
scoring_system epss
scoring_elements 0.81496
published_at 2026-04-11T12:55:00Z
10
value 0.0156
scoring_system epss
scoring_elements 0.81483
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102067
reference_id 1102067
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102067
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102211
reference_id 1102211
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102211
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357066
reference_id 2357066
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357066
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-32049
reference_id CVE-2025-32049
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/security/cve/CVE-2025-32049
29
reference_url https://access.redhat.com/errata/RHSA-2025:21657
reference_id RHSA-2025:21657
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:21657
30
reference_url https://access.redhat.com/errata/RHSA-2025:8126
reference_id RHSA-2025:8126
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8126
31
reference_url https://access.redhat.com/errata/RHSA-2025:8128
reference_id RHSA-2025:8128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8128
32
reference_url https://access.redhat.com/errata/RHSA-2025:8132
reference_id RHSA-2025:8132
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8132
33
reference_url https://access.redhat.com/errata/RHSA-2025:8139
reference_id RHSA-2025:8139
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8139
34
reference_url https://access.redhat.com/errata/RHSA-2025:8140
reference_id RHSA-2025:8140
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8140
35
reference_url https://access.redhat.com/errata/RHSA-2025:8252
reference_id RHSA-2025:8252
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8252
36
reference_url https://access.redhat.com/errata/RHSA-2025:8480
reference_id RHSA-2025:8480
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8480
37
reference_url https://access.redhat.com/errata/RHSA-2025:8481
reference_id RHSA-2025:8481
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8481
38
reference_url https://access.redhat.com/errata/RHSA-2025:8482
reference_id RHSA-2025:8482
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8482
39
reference_url https://access.redhat.com/errata/RHSA-2025:8663
reference_id RHSA-2025:8663
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:8663
40
reference_url https://access.redhat.com/errata/RHSA-2025:9179
reference_id RHSA-2025:9179
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/
url https://access.redhat.com/errata/RHSA-2025:9179
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jj7w-5tgz-4kcr