[SECURITY] Fedora 41 Update: mingw-libsoup-2.74.3-12.fc41

Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into se ...

Continue Reading
[SECURITY] Fedora 42 Update: mingw-libsoup-2.74.3-12.fc42

Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into se ...

Continue Reading
RHEL 10 : libsoup3 (RHSA-2025:7505)

The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:7505 advisory. Libsoup is an HTTP library implementation ...

Continue Reading
RHEL 10 : libsoup3 (RHSA-2025:8128)

The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:8128 advisory. Libsoup is an HTTP library implementation ...

Continue Reading
RHEL 10 : php (RHSA-2025:7489)

The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:7489 advisory. PHP is an HTML-embedded scripting language ...

Continue Reading
Dassault Systèmes DELMIA Apriso (up to 2025) – Insecure Deserialization

A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code...Read More ...

Continue Reading
Privilege Escalation

org.wso2.am, am-parent, org.wso2.is, identity-server-parent are vulnerable to privilege escalation. The vulnerability is due to improper validation and access control in the SOAP admin services, which ...

Continue Reading
WSO2 products vulnerable to privilege escalation due to business logic flaw in SOAP admin services

A privilege escalation vulnerability exists in multiple WSO2 products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when a ...

Continue Reading

Back to Main

Subscribe for the latest news: