{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:59:18.258","vulnerabilities":[{"cve":{"id":"CVE-2025-53537","sourceIdentifier":"security-advisories@github.com","published":"2025-07-23T21:15:26.613","lastModified":"2025-08-05T15:48:54.677","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LibHTP is a security-aware parser for the HTTP protocol and its related bits and pieces. In versions 0.5.50 and below, there is a traffic-induced memory leak that can starve the process of memory, leading to loss of visibility. To workaround this issue, set `suricata.yaml app-layer.protocols.http.libhtp.default-config.lzma-enabled` to false. This issue is fixed in version 0.5.51."},{"lang":"es","value":"LibHTP es un analizador con seguridad para el protocolo HTTP y sus componentes relacionados. En las versiones 0.5.50 y anteriores, existe una fuga de memoria inducida por el tráfico que puede agotar la memoria del proceso, lo que provoca pérdida de visibilidad. Para solucionar este problema, configure `suricata.yaml app-layer.protocols.http.libhtp.default-config.lzma-enabled` como falso. Este problema se solucionó en la versión 0.5.51."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oisf:libhtp:*:*:*:*:*:*:*:*","versionEndExcluding":"0.5.51","matchCriteriaId":"6D325889-4605-4C69-9A59-3DEA67399B28"}]}]}],"references":[{"url":"https://github.com/OISF/libhtp/commit/9037ea35110a0d97be5cedf8d31fb4cd9a38c7a7","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/libhtp/security/advisories/GHSA-v3qq-h8mh-vph7","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}