Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-gjc2-b1zs-s3f3
Vulnerability ID VCID-gjc2-b1zs-s3f3
Aliases CVE-2026-0719
Summary libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication
Status Published
Exploitability 0.5
Weighted Severity 7.7
Risk 3.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:1948
ssvc Track* https://access.redhat.com/errata/RHSA-2026:1948
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2005
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2005
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2006
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2006
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2007
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2007
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2008
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2008
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2049
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2049
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2182
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2182
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2214
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2214
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2215
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2215
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2216
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2216
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2396
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2396
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2402
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2402
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2512
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2512
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2513
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2513
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2514
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2514
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2528
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2528
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2529
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2529
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2628
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2628
cvssv3.1 8.6 https://access.redhat.com/errata/RHSA-2026:2844
ssvc Track* https://access.redhat.com/errata/RHSA-2026:2844
cvssv3 8.6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0719.json
cvssv3.1 8.6 https://access.redhat.com/security/cve/CVE-2026-0719
ssvc Track* https://access.redhat.com/security/cve/CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
epss 0.00051 https://api.first.org/data/v1/epss?cve=CVE-2026-0719
cvssv3.1 8.6 https://bugzilla.redhat.com/show_bug.cgi?id=2427906
ssvc Track* https://bugzilla.redhat.com/show_bug.cgi?id=2427906
cvssv3.1 8.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.6 https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
ssvc Track* https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0719.json
https://api.first.org/data/v1/epss?cve=CVE-2026-0719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0719
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1125083 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125083
2427906 https://bugzilla.redhat.com/show_bug.cgi?id=2427906
477 https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
cpe:/a:redhat:enterprise_linux:8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:enterprise_linux:9::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:openshift_devspaces:3.26::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_devspaces:3.26::el9
cpe:/a:redhat:rhel_aus:8.2::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
cpe:/a:redhat:rhel_aus:8.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
cpe:/a:redhat:rhel_aus:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
cpe:/a:redhat:rhel_e4s:9.0::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
cpe:/a:redhat:rhel_e4s:9.2::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/a:redhat:rhel_eus:9.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
cpe:/a:redhat:rhel_tus:8.6::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
cpe:/a:redhat:rhel_tus:8.8::appstream https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
cpe:/o:redhat:enterprise_linux:10.1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
cpe:/o:redhat:enterprise_linux:6 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
cpe:/o:redhat:enterprise_linux_eus:10.0 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
cpe:/o:redhat:rhel_aus:8.2::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
cpe:/o:redhat:rhel_aus:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
cpe:/o:redhat:rhel_aus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
cpe:/o:redhat:rhel_els:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus_long_life:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
cpe:/o:redhat:rhel_tus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
cpe:/o:redhat:rhel_tus:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
CVE-2026-0719 https://access.redhat.com/security/cve/CVE-2026-0719
RHSA-2026:1948 https://access.redhat.com/errata/RHSA-2026:1948
RHSA-2026:2005 https://access.redhat.com/errata/RHSA-2026:2005
RHSA-2026:2006 https://access.redhat.com/errata/RHSA-2026:2006
RHSA-2026:2007 https://access.redhat.com/errata/RHSA-2026:2007
RHSA-2026:2008 https://access.redhat.com/errata/RHSA-2026:2008
RHSA-2026:2049 https://access.redhat.com/errata/RHSA-2026:2049
RHSA-2026:2182 https://access.redhat.com/errata/RHSA-2026:2182
RHSA-2026:2214 https://access.redhat.com/errata/RHSA-2026:2214
RHSA-2026:2215 https://access.redhat.com/errata/RHSA-2026:2215
RHSA-2026:2216 https://access.redhat.com/errata/RHSA-2026:2216
RHSA-2026:2396 https://access.redhat.com/errata/RHSA-2026:2396
RHSA-2026:2402 https://access.redhat.com/errata/RHSA-2026:2402
RHSA-2026:2512 https://access.redhat.com/errata/RHSA-2026:2512
RHSA-2026:2513 https://access.redhat.com/errata/RHSA-2026:2513
RHSA-2026:2514 https://access.redhat.com/errata/RHSA-2026:2514
RHSA-2026:2528 https://access.redhat.com/errata/RHSA-2026:2528
RHSA-2026:2529 https://access.redhat.com/errata/RHSA-2026:2529
RHSA-2026:2628 https://access.redhat.com/errata/RHSA-2026:2628
RHSA-2026:2844 https://access.redhat.com/errata/RHSA-2026:2844
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:1948
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:1948
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2005
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2006
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2007
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2008
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2008
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2049
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2049
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2182
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2182
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2214
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2214
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2215
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2215
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2216
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2216
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2396
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2396
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2402
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2402
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2512
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2512
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2513
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2513
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2514
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2514
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2528
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2528
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2529
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2529
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2628
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2628
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/errata/RHSA-2026:2844
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/errata/RHSA-2026:2844
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0719.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://access.redhat.com/security/cve/CVE-2026-0719
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://access.redhat.com/security/cve/CVE-2026-0719
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2427906
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2427906
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Found at https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-08T14:26:11Z/ Found at https://gitlab.gnome.org/GNOME/libsoup/-/issues/477
Exploit Prediction Scoring System (EPSS)
Percentile 0.15892
EPSS Score 0.00051
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:32:57.115680+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0719.json 38.0.0