{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70467?format=json","vulnerability_id":"VCID-jj7w-5tgz-4kcr","summary":"libsoup: Denial of Service attack to websocket server","aliases":[{"alias":"CVE-2025-32049"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/90471?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.2-6?arch=el7_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-24tr-cene-gfch"},{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-ku6w-4wsv-qbe4"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"},{"vulnerability":"VCID-zhp7-2ks9-m7es"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.2-6%3Farch=el7_9"},{"url":"http://public2.vulnerablecode.io/api/packages/88659?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.2-9?arch=el7_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-24tr-cene-gfch"},{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-7hhg-3u9v-nqfw"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-ku6w-4wsv-qbe4"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-tpky-j79x-pqd4"},{"vulnerability":"VCID-yx68-81fu-ffar"},{"vulnerability":"VCID-zhp7-2ks9-m7es"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.2-9%3Farch=el7_9"},{"url":"http://public2.vulnerablecode.io/api/packages/90463?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.3-1.el8_2?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-1.el8_2%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90467?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.3-2.el8_4?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_4%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90464?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.3-2.el8_6?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-2.el8_6%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90466?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.3-3.el8_8?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-3.el8_8%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90462?format=json","purl":"pkg:rpm/redhat/libsoup@2.62.3-9?arch=el8_10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.62.3-9%3Farch=el8_10"},{"url":"http://public2.vulnerablecode.io/api/packages/90472?format=json","purl":"pkg:rpm/redhat/libsoup@2.72.0-8.el9_0?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_0%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90470?format=json","purl":"pkg:rpm/redhat/libsoup@2.72.0-8.el9_2?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_2%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90469?format=json","purl":"pkg:rpm/redhat/libsoup@2.72.0-8.el9_4?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-8.el9_4%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/90468?format=json","purl":"pkg:rpm/redhat/libsoup@2.72.0-10.el9_6?arch=2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6skx-v6sg-53gq"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"},{"vulnerability":"VCID-yx68-81fu-ffar"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup@2.72.0-10.el9_6%3Farch=2"},{"url":"http://public2.vulnerablecode.io/api/packages/90465?format=json","purl":"pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0?arch=6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4scr-ppqy-5ugf"},{"vulnerability":"VCID-e8ye-fsm9-2kcr"},{"vulnerability":"VCID-jj7w-5tgz-4kcr"},{"vulnerability":"VCID-rd74-1427-eybf"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libsoup3@3.6.5-3.el10_0%3Farch=6"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32049.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32049","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69814","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69754","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69804","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81469","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81514","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81551","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81569","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81587","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.8161","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0156","scoring_system":"epss","scoring_elements":"0.81607","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102067","reference_id":"1102067","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102067"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102211","reference_id":"1102211","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357066","reference_id":"2357066","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357066"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0","reference_id":"cpe:/o:redhat:enterprise_linux:10.0","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_aus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_tus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-32049","reference_id":"CVE-2025-32049","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-32049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21657","reference_id":"RHSA-2025:21657","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:21657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8126","reference_id":"RHSA-2025:8126","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8128","reference_id":"RHSA-2025:8128","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8132","reference_id":"RHSA-2025:8132","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8139","reference_id":"RHSA-2025:8139","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8140","reference_id":"RHSA-2025:8140","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8252","reference_id":"RHSA-2025:8252","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8480","reference_id":"RHSA-2025:8480","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8481","reference_id":"RHSA-2025:8481","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8482","reference_id":"RHSA-2025:8482","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8663","reference_id":"RHSA-2025:8663","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9179","reference_id":"RHSA-2025:9179","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:58:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:9179"}],"weaknesses":[{"cwe_id":770,"name":"Allocation of Resources Without Limits or Throttling","description":"The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor."}],"exploits":[],"severity_range_score":"7.5 - 7.5","exploitability":"0.5","weighted_severity":"6.8","risk_score":3.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jj7w-5tgz-4kcr"}