Количество 18
Количество 18

BDU:2025-00232
Уязвимость функции soup_header_parse_param_list_strict() библиотеки libsoup графического интерфейса GNOME, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20250430-04
Множественные уязвимости libsoup

CVE-2024-52531
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

CVE-2024-52531
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

CVE-2024-52531
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).

CVE-2024-52531
CVE-2024-52531
GNOME libsoup before 3.6.1 allows a buffer overflow in applications th ...

RLSA-2025:0838
Important: libsoup security update
GHSA-5mc3-gwcr-mgc3
GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.
ELSA-2025-1047
ELSA-2025-1047: libsoup security update (IMPORTANT)
ELSA-2025-0838
ELSA-2025-0838: libsoup security update (IMPORTANT)
ELSA-2025-0791
ELSA-2025-0791: libsoup security update (IMPORTANT)

SUSE-SU-2024:4365-1
Security update for libsoup

SUSE-SU-2024:4355-1
Security update for libsoup

SUSE-SU-2024:4352-1
Security update for libsoup

SUSE-SU-2024:4349-1
Security update for libsoup2

SUSE-SU-2024:4290-1
Security update for libsoup2

SUSE-SU-2025:1518-1
Security update for libsoup
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-00232 Уязвимость функции soup_header_parse_param_list_strict() библиотеки libsoup графического интерфейса GNOME, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.4 | 0% Низкий | 10 месяцев назад |
![]() | ROS-20250430-04 Множественные уязвимости libsoup | CVSS3: 8.4 | около 2 месяцев назад | |
![]() | CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response). | CVSS3: 6.5 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response). | CVSS3: 9 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response). | CVSS3: 6.5 | 0% Низкий | 7 месяцев назад |
![]() | CVSS3: 8.4 | 0% Низкий | 7 месяцев назад | |
CVE-2024-52531 GNOME libsoup before 3.6.1 allows a buffer overflow in applications th ... | CVSS3: 6.5 | 0% Низкий | 7 месяцев назад | |
![]() | RLSA-2025:0838 Important: libsoup security update | 0% Низкий | 4 месяца назад | |
GHSA-5mc3-gwcr-mgc3 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. | CVSS3: 8.4 | 0% Низкий | 7 месяцев назад | |
ELSA-2025-1047 ELSA-2025-1047: libsoup security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-0838 ELSA-2025-0838: libsoup security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-0791 ELSA-2025-0791: libsoup security update (IMPORTANT) | 5 месяцев назад | |||
![]() | SUSE-SU-2024:4365-1 Security update for libsoup | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4355-1 Security update for libsoup | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4352-1 Security update for libsoup | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4349-1 Security update for libsoup2 | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4290-1 Security update for libsoup2 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:1518-1 Security update for libsoup | около 1 месяца назад |
Уязвимостей на страницу