Metrics
Affected Vendors & Products
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat camel K Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:camel_k:1.10.9 cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat
Redhat camel K Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnome
Gnome libsoup |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gnome
Gnome libsoup |
|
Metrics |
cvssV3_1
|
ssvc
|
Tue, 12 Nov 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 11 Nov 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-12T18:35:11.322Z
Reserved: 2024-11-11T00:00:00
Link: CVE-2024-52531

Updated: 2024-11-12T18:34:59.609Z

Status : Awaiting Analysis
Published: 2024-11-11T20:15:20.313
Modified: 2024-11-12T19:35:15.807
Link: CVE-2024-52531
