Количество 23
Количество 23
CVE-2026-1761
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
CVE-2026-1761
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
CVE-2026-1761
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
CVE-2026-1761
A flaw was found in libsoup. This stack-based buffer overflow vulnerab ...
openSUSE-SU-2026:20283-1
Security update for libsoup2
SUSE-SU-2026:0419-1
Security update for libsoup2
RLSA-2026:2410
Important: libsoup3 security update
GHSA-6j8r-j98h-9g9f
A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
ELSA-2026-2410
ELSA-2026-2410: libsoup3 security update (IMPORTANT)
BDU:2026-04958
Уязвимость библиотеки доступа к HTTP серверам LibSoup, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
openSUSE-SU-2026:20186-1
Security update for libsoup
SUSE-SU-2026:0579-1
Security update for libsoup
SUSE-SU-2026:0431-1
Security update for libsoup
RLSA-2026:2216
Important: libsoup security update
RLSA-2026:2215
Important: libsoup security update
RLSA-2026:2214
Important: spice-client-win security update
RLSA-2026:2182
Important: libsoup3 security update
ELSA-2026-2628
ELSA-2026-2628: libsoup security update (IMPORTANT)
ELSA-2026-2216
ELSA-2026-2216: libsoup security update (IMPORTANT)
ELSA-2026-2215
ELSA-2026-2215: libsoup security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-1761 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction. | CVSS3: 8.6 | 1% Низкий | 2 месяца назад | |
CVE-2026-1761 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction. | CVSS3: 8.6 | 1% Низкий | 3 месяца назад | |
CVE-2026-1761 A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction. | CVSS3: 8.6 | 1% Низкий | 2 месяца назад | |
CVE-2026-1761 A flaw was found in libsoup. This stack-based buffer overflow vulnerab ... | CVSS3: 8.6 | 1% Низкий | 2 месяца назад | |
openSUSE-SU-2026:20283-1 Security update for libsoup2 | 1% Низкий | около 2 месяцев назад | ||
SUSE-SU-2026:0419-1 Security update for libsoup2 | 1% Низкий | 2 месяца назад | ||
RLSA-2026:2410 Important: libsoup3 security update | 1% Низкий | 2 месяца назад | ||
GHSA-6j8r-j98h-9g9f A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction. | CVSS3: 8.6 | 1% Низкий | 2 месяца назад | |
ELSA-2026-2410 ELSA-2026-2410: libsoup3 security update (IMPORTANT) | 2 месяца назад | |||
BDU:2026-04958 Уязвимость библиотеки доступа к HTTP серверам LibSoup, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.6 | 1% Низкий | 5 месяцев назад | |
openSUSE-SU-2026:20186-1 Security update for libsoup | 2 месяца назад | |||
SUSE-SU-2026:0579-1 Security update for libsoup | около 2 месяцев назад | |||
SUSE-SU-2026:0431-1 Security update for libsoup | 2 месяца назад | |||
RLSA-2026:2216 Important: libsoup security update | 2 месяца назад | |||
RLSA-2026:2215 Important: libsoup security update | 2 месяца назад | |||
RLSA-2026:2214 Important: spice-client-win security update | 2 месяца назад | |||
RLSA-2026:2182 Important: libsoup3 security update | 2 месяца назад | |||
ELSA-2026-2628 ELSA-2026-2628: libsoup security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-2216 ELSA-2026-2216: libsoup security update (IMPORTANT) | 2 месяца назад | |||
ELSA-2026-2215 ELSA-2026-2215: libsoup security update (IMPORTANT) | 2 месяца назад |
Уязвимостей на страницу