Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/binutils@2.35.2-2
Typedeb
Namespacedebian
Namebinutils
Version2.35.2-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.43.1-5
Latest_non_vulnerable_version2.45.50.20251125-1
Affected_by_vulnerabilities
0
url VCID-2feg-zk6f-jqax
vulnerability_id VCID-2feg-zk6f-jqax
summary binutils: GNU Binutils ld elflink.c bfd_elf_reloc_symbol_deleted_p memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1182
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28436
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28231
published_at 2026-04-21T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28278
published_at 2026-04-18T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28297
published_at 2026-04-16T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28284
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28342
published_at 2026-04-12T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28381
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28338
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28272
published_at 2026-04-07T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28479
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
reference_id 1108986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344853
reference_id 2344853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344853
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15919
reference_id attachment.cgi?id=15919
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15919
7
reference_url https://vuldb.com/?ctiid.295086
reference_id ?ctiid.295086
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://vuldb.com/?ctiid.295086
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad
reference_id gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad
9
reference_url https://vuldb.com/?id.295086
reference_id ?id.295086
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://vuldb.com/?id.295086
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32644
reference_id show_bug.cgi?id=32644
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32644
11
reference_url https://vuldb.com/?submit.495407
reference_id ?submit.495407
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://vuldb.com/?submit.495407
12
reference_url https://usn.ubuntu.com/7423-1/
reference_id USN-7423-1
reference_type
scores
url https://usn.ubuntu.com/7423-1/
13
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
14
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
15
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1182
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2feg-zk6f-jqax
1
url VCID-2sxq-338y-zudp
vulnerability_id VCID-2sxq-338y-zudp
summary binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47673
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03675
published_at 2026-04-21T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03609
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03536
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03549
published_at 2026-04-18T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03625
published_at 2026-04-04T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03633
published_at 2026-04-07T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03635
published_at 2026-04-08T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03656
published_at 2026-04-09T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03614
published_at 2026-04-11T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03587
published_at 2026-04-12T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03563
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234013
reference_id 2234013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234013
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29876
reference_id show_bug.cgi?id=29876
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:09:56Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29876
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47673
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sxq-338y-zudp
2
url VCID-3abw-ksjw-hkff
vulnerability_id VCID-3abw-ksjw-hkff
summary binutils: Field `file_table` of `struct module *module` is uninitialized
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25585
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05937
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05758
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05796
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.0579
published_at 2026-04-18T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.0583
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05854
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05833
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05823
published_at 2026-04-12T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05817
published_at 2026-04-13T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05783
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167498
reference_id 2167498
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2167498
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-25585
reference_id CVE-2023-25585
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/
url https://access.redhat.com/security/cve/CVE-2023-25585
10
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
reference_id gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
11
reference_url https://security.netapp.com/advisory/ntap-20231103-0003/
reference_id ntap-20231103-0003
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/
url https://security.netapp.com/advisory/ntap-20231103-0003/
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29892
reference_id show_bug.cgi?id=29892
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29892
13
reference_url https://usn.ubuntu.com/6101-1/
reference_id USN-6101-1
reference_type
scores
url https://usn.ubuntu.com/6101-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2023-25585
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3abw-ksjw-hkff
3
url VCID-3j3x-b5s8-p7c1
vulnerability_id VCID-3j3x-b5s8-p7c1
summary binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47695
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05254
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05112
published_at 2026-04-02T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05097
published_at 2026-04-16T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05102
published_at 2026-04-18T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05141
published_at 2026-04-04T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05163
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05196
published_at 2026-04-08T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05213
published_at 2026-04-09T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05183
published_at 2026-04-11T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05167
published_at 2026-04-12T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234027
reference_id 2234027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234027
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29846
reference_id show_bug.cgi?id=29846
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:31:16Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29846
6
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
7
reference_url https://usn.ubuntu.com/6655-1/
reference_id USN-6655-1
reference_type
scores
url https://usn.ubuntu.com/6655-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47695
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3j3x-b5s8-p7c1
4
url VCID-4d5t-1hwt-43at
vulnerability_id VCID-4d5t-1hwt-43at
summary binutils: GNU Binutils out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11081
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07164
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07294
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.0717
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07176
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07245
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07254
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07271
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07244
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-07T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.0721
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2399944
reference_id 2399944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2399944
5
reference_url https://vuldb.com/?ctiid.326122
reference_id ?ctiid.326122
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://vuldb.com/?ctiid.326122
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
reference_id gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b
7
reference_url https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt
reference_id hdf5_crash_3.txt
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt
8
reference_url https://vuldb.com/?id.326122
reference_id ?id.326122
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://vuldb.com/?id.326122
9
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33406
reference_id show_bug.cgi?id=33406
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33406
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2
reference_id show_bug.cgi?id=33406#c2
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2
12
reference_url https://vuldb.com/?submit.661275
reference_id ?submit.661275
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://vuldb.com/?submit.661275
13
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d5t-1hwt-43at
5
url VCID-4k1k-tmj9-zyar
vulnerability_id VCID-4k1k-tmj9-zyar
summary binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1152
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14854
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14947
published_at 2026-04-12T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1489
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14789
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14796
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15848
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15704
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15789
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15838
published_at 2026-04-02T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23199
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1152
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344723
reference_id 2344723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344723
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15887
reference_id attachment.cgi?id=15887
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15887
6
reference_url https://vuldb.com/?ctiid.295056
reference_id ?ctiid.295056
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/
url https://vuldb.com/?ctiid.295056
7
reference_url https://vuldb.com/?id.295056
reference_id ?id.295056
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/
url https://vuldb.com/?id.295056
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
reference_id show_bug.cgi?id=32576
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
9
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1152
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k1k-tmj9-zyar
6
url VCID-4uea-bxbr-2kdz
vulnerability_id VCID-4uea-bxbr-2kdz
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3530
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.57639
published_at 2026-04-01T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57753
published_at 2026-04-21T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57779
published_at 2026-04-16T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57777
published_at 2026-04-18T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57724
published_at 2026-04-02T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57745
published_at 2026-04-04T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57719
published_at 2026-04-07T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57774
published_at 2026-04-08T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57776
published_at 2026-04-09T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.57791
published_at 2026-04-11T12:55:00Z
10
value 0.00354
scoring_system epss
scoring_elements 0.5777
published_at 2026-04-12T12:55:00Z
11
value 0.00354
scoring_system epss
scoring_elements 0.5775
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956423
reference_id 1956423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956423
5
reference_url https://security.archlinux.org/AVG-1540
reference_id AVG-1540
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1540
6
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-3530
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uea-bxbr-2kdz
7
url VCID-5cqh-f862-zugq
vulnerability_id VCID-5cqh-f862-zugq
summary binutils: memory leak in parse_stab_struct_fields() in stabs.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47011
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00862
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00906
published_at 2026-04-21T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00851
published_at 2026-04-16T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00857
published_at 2026-04-18T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-04T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-07T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00869
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00856
published_at 2026-04-11T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.0085
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233992
reference_id 2233992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233992
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29261
reference_id show_bug.cgi?id=29261
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:12:35Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29261
6
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47011
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cqh-f862-zugq
8
url VCID-5rak-8wp8-hqcm
vulnerability_id VCID-5rak-8wp8-hqcm
summary binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25588
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05294
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05326
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05348
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05382
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05373
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05362
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05354
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05301
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05302
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167505
reference_id 2167505
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2167505
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-25588
reference_id CVE-2023-25588
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/
url https://access.redhat.com/security/cve/CVE-2023-25588
10
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
reference_id gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
11
reference_url https://security.netapp.com/advisory/ntap-20231103-0003/
reference_id ntap-20231103-0003
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/
url https://security.netapp.com/advisory/ntap-20231103-0003/
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29677
reference_id show_bug.cgi?id=29677
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29677
13
reference_url https://usn.ubuntu.com/6101-1/
reference_id USN-6101-1
reference_type
scores
url https://usn.ubuntu.com/6101-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2023-25588
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rak-8wp8-hqcm
9
url VCID-66e8-kf7g-2bcv
vulnerability_id VCID-66e8-kf7g-2bcv
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45078
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36696
published_at 2026-04-01T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36851
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36883
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36718
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36769
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36785
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36795
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.3676
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36735
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36779
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36762
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36703
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2033715
reference_id 2033715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2033715
5
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
6
reference_url https://usn.ubuntu.com/5341-1/
reference_id USN-5341-1
reference_type
scores
url https://usn.ubuntu.com/5341-1/
7
reference_url https://usn.ubuntu.com/6160-1/
reference_id USN-6160-1
reference_type
scores
url https://usn.ubuntu.com/6160-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-45078
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66e8-kf7g-2bcv
10
url VCID-6cjq-sz9f-mqf9
vulnerability_id VCID-6cjq-sz9f-mqf9
summary libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3826
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-01T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.68113
published_at 2026-04-02T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68131
published_at 2026-04-04T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68109
published_at 2026-04-07T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.6816
published_at 2026-04-08T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68175
published_at 2026-04-09T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.682
published_at 2026-04-11T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68186
published_at 2026-04-12T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68153
published_at 2026-04-13T12:55:00Z
9
value 0.00556
scoring_system epss
scoring_elements 0.68192
published_at 2026-04-16T12:55:00Z
10
value 0.00556
scoring_system epss
scoring_elements 0.68203
published_at 2026-04-18T12:55:00Z
11
value 0.00556
scoring_system epss
scoring_elements 0.68185
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122627
reference_id 2122627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122627
5
reference_url https://access.redhat.com/errata/RHSA-2023:3269
reference_id RHSA-2023:3269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3269
6
reference_url https://access.redhat.com/errata/RHSA-2023:6372
reference_id RHSA-2023:6372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6372
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-3826
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cjq-sz9f-mqf9
11
url VCID-6kvf-hsu3-nfc3
vulnerability_id VCID-6kvf-hsu3-nfc3
summary binutils: Binutils DWARF Section Handler Memory Leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8225
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06446
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06482
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06563
published_at 2026-04-09T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06522
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06557
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08485
published_at 2026-04-21T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08466
published_at 2026-04-12T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08452
published_at 2026-04-13T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08345
published_at 2026-04-16T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8225
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2383686
reference_id 2383686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2383686
5
reference_url https://vuldb.com/?ctiid.317813
reference_id ?ctiid.317813
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/
url https://vuldb.com/?ctiid.317813
6
reference_url https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4
reference_id e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/
url https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4
7
reference_url https://vuldb.com/?id.317813
reference_id ?id.317813
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/
url https://vuldb.com/?id.317813
8
reference_url https://vuldb.com/?submit.621883
reference_id ?submit.621883
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/
url https://vuldb.com/?submit.621883
9
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
10
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
11
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-8225
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6kvf-hsu3-nfc3
12
url VCID-6v51-g3b9-3qbf
vulnerability_id VCID-6v51-g3b9-3qbf
summary binutils: Binutils BFD Null Pointer Dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8224
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.0861
published_at 2026-04-02T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08654
published_at 2026-04-08T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08677
published_at 2026-04-11T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08678
published_at 2026-04-09T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08581
published_at 2026-04-07T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08661
published_at 2026-04-04T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11127
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11121
published_at 2026-04-21T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10984
published_at 2026-04-18T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.1097
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11105
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8224
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2383679
reference_id 2383679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2383679
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15680
reference_id attachment.cgi?id=15680
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15680
6
reference_url https://vuldb.com/?ctiid.317812
reference_id ?ctiid.317812
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://vuldb.com/?ctiid.317812
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530
reference_id gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530
8
reference_url https://vuldb.com/?id.317812
reference_id ?id.317812
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://vuldb.com/?id.317812
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32109
reference_id show_bug.cgi?id=32109
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32109
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2
reference_id show_bug.cgi?id=32109#c2
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2
11
reference_url https://vuldb.com/?submit.621878
reference_id ?submit.621878
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://vuldb.com/?submit.621878
12
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2025-8224
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6v51-g3b9-3qbf
13
url VCID-7sc8-fzw3-vfer
vulnerability_id VCID-7sc8-fzw3-vfer
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35448
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32892
published_at 2026-04-02T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32762
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32927
published_at 2026-04-04T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55682
published_at 2026-04-21T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55699
published_at 2026-04-16T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55703
published_at 2026-04-18T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55634
published_at 2026-04-07T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-08T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-09T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55697
published_at 2026-04-11T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55678
published_at 2026-04-12T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.5566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950478
reference_id 1950478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950478
5
reference_url https://security.archlinux.org/AVG-1385
reference_id AVG-1385
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1385
6
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
7
reference_url https://access.redhat.com/errata/RHSA-2021:4364
reference_id RHSA-2021:4364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4364
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2020-35448
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer
14
url VCID-7vbm-bp51-4faa
vulnerability_id VCID-7vbm-bp51-4faa
summary binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1178
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31081
published_at 2026-04-02T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.30925
published_at 2026-04-21T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-18T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30979
published_at 2026-04-16T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30948
published_at 2026-04-13T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-12T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31037
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.3103
published_at 2026-04-09T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.31001
published_at 2026-04-08T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30944
published_at 2026-04-07T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.31127
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1178
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
reference_id 1108986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344834
reference_id 2344834
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344834
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15914
reference_id attachment.cgi?id=15914
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15914
7
reference_url https://vuldb.com/?ctiid.295081
reference_id ?ctiid.295081
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://vuldb.com/?ctiid.295081
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0
reference_id gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0
9
reference_url https://vuldb.com/?id.295081
reference_id ?id.295081
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://vuldb.com/?id.295081
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32638
reference_id show_bug.cgi?id=32638
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32638
11
reference_url https://vuldb.com/?submit.495369
reference_id ?submit.495369
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://vuldb.com/?submit.495369
12
reference_url https://usn.ubuntu.com/7423-1/
reference_id USN-7423-1
reference_type
scores
url https://usn.ubuntu.com/7423-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
3
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1178
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vbm-bp51-4faa
15
url VCID-84t7-666n-fydn
vulnerability_id VCID-84t7-666n-fydn
summary binutils: GNU Binutils Linker out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11494
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09958
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09978
published_at 2026-04-21T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09828
published_at 2026-04-18T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09857
published_at 2026-04-16T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09982
published_at 2026-04-13T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10004
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10044
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10028
published_at 2026-04-09T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09979
published_at 2026-04-08T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09904
published_at 2026-04-07T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10006
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402559
reference_id 2402559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402559
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16389
reference_id attachment.cgi?id=16389
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16389
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.327619
reference_id ?ctiid.327619
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://vuldb.com/?ctiid.327619
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
reference_id gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a
9
reference_url https://vuldb.com/?id.327619
reference_id ?id.327619
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://vuldb.com/?id.327619
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33499
reference_id show_bug.cgi?id=33499
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33499
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2
reference_id show_bug.cgi?id=33499#c2
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2
13
reference_url https://vuldb.com/?submit.668281
reference_id ?submit.668281
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://vuldb.com/?submit.668281
14
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
15
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11494
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84t7-666n-fydn
16
url VCID-88yz-vyfa-xuec
vulnerability_id VCID-88yz-vyfa-xuec
summary binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5245
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.2459
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24413
published_at 2026-04-21T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24438
published_at 2026-04-18T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24444
published_at 2026-04-16T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24428
published_at 2026-04-13T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24486
published_at 2026-04-12T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24529
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24514
published_at 2026-04-09T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24471
published_at 2026-04-08T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24402
published_at 2026-04-07T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24626
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5245
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368771
reference_id 2368771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368771
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16004
reference_id attachment.cgi?id=16004
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16004
6
reference_url https://vuldb.com/?ctiid.310347
reference_id ?ctiid.310347
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://vuldb.com/?ctiid.310347
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
reference_id gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
8
reference_url https://vuldb.com/?id.310347
reference_id ?id.310347
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://vuldb.com/?id.310347
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32829
reference_id show_bug.cgi?id=32829
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32829
10
reference_url https://vuldb.com/?submit.584635
reference_id ?submit.584635
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://vuldb.com/?submit.584635
11
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
12
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-5245
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88yz-vyfa-xuec
17
url VCID-8p5q-y7th-e7a3
vulnerability_id VCID-8p5q-y7th-e7a3
summary binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11412
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07164
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07294
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.0717
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07176
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07245
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07254
published_at 2026-04-12T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07271
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07244
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-07T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.0721
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402425
reference_id 2402425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402425
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16378
reference_id attachment.cgi?id=16378
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16378
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.327348
reference_id ?ctiid.327348
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://vuldb.com/?ctiid.327348
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
reference_id gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc
9
reference_url https://vuldb.com/?id.327348
reference_id ?id.327348
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://vuldb.com/?id.327348
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33452
reference_id show_bug.cgi?id=33452
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33452
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8
reference_id show_bug.cgi?id=33452#c8
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8
13
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11412
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p5q-y7th-e7a3
18
url VCID-9v6f-mzak-87d6
vulnerability_id VCID-9v6f-mzak-87d6
summary binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48064
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00932
published_at 2026-04-21T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00888
published_at 2026-04-02T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00892
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00896
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00894
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00883
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00877
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00878
published_at 2026-04-13T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00876
published_at 2026-04-16T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.0089
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48064
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233958
reference_id 2233958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233958
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/
reference_id 3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
reference_id KGSKF4GH7425S6XFDQMWTJGD5U47BAZN
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/
reference_id NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/
9
reference_url https://security.netapp.com/advisory/ntap-20231006-0008/
reference_id ntap-20231006-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://security.netapp.com/advisory/ntap-20231006-0008/
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29922
reference_id show_bug.cgi?id=29922
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29922
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-48064
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9v6f-mzak-87d6
19
url VCID-a6f4-kkt1-yugs
vulnerability_id VCID-a6f4-kkt1-yugs
summary binutils: GNU Binutils Linker heap-based overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11083
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06365
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06548
published_at 2026-04-21T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-18T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06389
published_at 2026-04-16T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0645
published_at 2026-04-13T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06461
published_at 2026-04-12T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06468
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06474
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06431
published_at 2026-04-08T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06383
published_at 2026-04-07T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06394
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2399948
reference_id 2399948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2399948
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16353
reference_id attachment.cgi?id=16353
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16353
6
reference_url https://vuldb.com/?ctiid.326124
reference_id ?ctiid.326124
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://vuldb.com/?ctiid.326124
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
reference_id gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490
8
reference_url https://vuldb.com/?id.326124
reference_id ?id.326124
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://vuldb.com/?id.326124
9
reference_url https://access.redhat.com/errata/RHSA-2025:23232
reference_id RHSA-2025:23232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23232
10
reference_url https://access.redhat.com/errata/RHSA-2025:23233
reference_id RHSA-2025:23233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23233
11
reference_url https://access.redhat.com/errata/RHSA-2025:23306
reference_id RHSA-2025:23306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23306
12
reference_url https://access.redhat.com/errata/RHSA-2025:23336
reference_id RHSA-2025:23336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23336
13
reference_url https://access.redhat.com/errata/RHSA-2025:23343
reference_id RHSA-2025:23343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23343
14
reference_url https://access.redhat.com/errata/RHSA-2025:23359
reference_id RHSA-2025:23359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23359
15
reference_url https://access.redhat.com/errata/RHSA-2025:23382
reference_id RHSA-2025:23382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23382
16
reference_url https://access.redhat.com/errata/RHSA-2025:23400
reference_id RHSA-2025:23400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23400
17
reference_url https://access.redhat.com/errata/RHSA-2025:23405
reference_id RHSA-2025:23405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23405
18
reference_url https://access.redhat.com/errata/RHSA-2026:0052
reference_id RHSA-2026:0052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0052
19
reference_url https://access.redhat.com/errata/RHSA-2026:0108
reference_id RHSA-2026:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0108
20
reference_url https://access.redhat.com/errata/RHSA-2026:0341
reference_id RHSA-2026:0341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0341
21
reference_url https://access.redhat.com/errata/RHSA-2026:0342
reference_id RHSA-2026:0342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0342
22
reference_url https://access.redhat.com/errata/RHSA-2026:0343
reference_id RHSA-2026:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0343
23
reference_url https://access.redhat.com/errata/RHSA-2026:0479
reference_id RHSA-2026:0479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0479
24
reference_url https://access.redhat.com/errata/RHSA-2026:0480
reference_id RHSA-2026:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0480
25
reference_url https://access.redhat.com/errata/RHSA-2026:0481
reference_id RHSA-2026:0481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0481
26
reference_url https://access.redhat.com/errata/RHSA-2026:0482
reference_id RHSA-2026:0482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0482
27
reference_url https://access.redhat.com/errata/RHSA-2026:0685
reference_id RHSA-2026:0685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0685
28
reference_url https://access.redhat.com/errata/RHSA-2026:0978
reference_id RHSA-2026:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0978
29
reference_url https://access.redhat.com/errata/RHSA-2026:1359
reference_id RHSA-2026:1359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1359
30
reference_url https://access.redhat.com/errata/RHSA-2026:1539
reference_id RHSA-2026:1539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1539
31
reference_url https://access.redhat.com/errata/RHSA-2026:2627
reference_id RHSA-2026:2627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2627
32
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
33
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33457
reference_id show_bug.cgi?id=33457
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33457
34
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
reference_id show_bug.cgi?id=33457#c1
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1
35
reference_url https://vuldb.com/?submit.661277
reference_id ?submit.661277
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://vuldb.com/?submit.661277
36
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
37
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
38
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11083
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6f4-kkt1-yugs
20
url VCID-b7k7-s2rd-j3h1
vulnerability_id VCID-b7k7-s2rd-j3h1
summary binutils: GNU Binutils ld libbfd.c bfd_malloc memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1150
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14998
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14854
published_at 2026-04-21T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15076
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1488
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14969
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.1502
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14984
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14947
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.1489
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14789
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14796
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344681
reference_id 2344681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344681
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15887
reference_id attachment.cgi?id=15887
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15887
6
reference_url https://vuldb.com/?ctiid.295054
reference_id ?ctiid.295054
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/
url https://vuldb.com/?ctiid.295054
7
reference_url https://vuldb.com/?id.295054
reference_id ?id.295054
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/
url https://vuldb.com/?id.295054
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
reference_id show_bug.cgi?id=32576
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
9
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1150
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7k7-s2rd-j3h1
21
url VCID-bmef-m4dw-kbeu
vulnerability_id VCID-bmef-m4dw-kbeu
summary binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35206
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07244
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0712
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07141
published_at 2026-04-16T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07118
published_at 2026-04-18T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07169
published_at 2026-04-04T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07143
published_at 2026-04-07T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07198
published_at 2026-04-08T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07229
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07226
published_at 2026-04-11T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07214
published_at 2026-04-12T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07204
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233975
reference_id 2233975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233975
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29290
reference_id show_bug.cgi?id=29290
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:32:59Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29290
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-35206
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmef-m4dw-kbeu
22
url VCID-by8y-uamt-f7bt
vulnerability_id VCID-by8y-uamt-f7bt
summary gcc: uncontrolled recursion in libiberty/rust-demangle.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46195
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2241
published_at 2026-04-13T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-12T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46047
published_at 2026-04-04T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.45995
published_at 2026-04-07T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46051
published_at 2026-04-08T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46072
published_at 2026-04-11T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46049
published_at 2026-04-09T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.45975
published_at 2026-04-01T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46027
published_at 2026-04-02T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50649
published_at 2026-04-16T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50654
published_at 2026-04-18T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50632
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2046300
reference_id 2046300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2046300
5
reference_url https://access.redhat.com/errata/RHSA-2022:8415
reference_id RHSA-2022:8415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8415
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-46195
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-by8y-uamt-f7bt
23
url VCID-cjbb-xm4r-c3b5
vulnerability_id VCID-cjbb-xm4r-c3b5
summary binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46174
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11002
published_at 2026-04-21T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10885
published_at 2026-04-18T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10917
published_at 2026-04-01T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11054
published_at 2026-04-02T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11118
published_at 2026-04-04T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10939
published_at 2026-04-07T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11017
published_at 2026-04-08T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.1107
published_at 2026-04-09T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11074
published_at 2026-04-11T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11043
published_at 2026-04-12T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.1102
published_at 2026-04-13T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234003
reference_id 2234003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234003
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=28753
reference_id show_bug.cgi?id=28753
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:53:41Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=28753
6
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
7
reference_url https://usn.ubuntu.com/6544-1/
reference_id USN-6544-1
reference_type
scores
url https://usn.ubuntu.com/6544-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-46174
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjbb-xm4r-c3b5
24
url VCID-cxp6-cmpk-7uff
vulnerability_id VCID-cxp6-cmpk-7uff
summary binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48063
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02937
published_at 2026-04-16T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02948
published_at 2026-04-18T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02985
published_at 2026-04-02T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03001
published_at 2026-04-04T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03006
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03007
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03031
published_at 2026-04-09T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02995
published_at 2026-04-11T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.0297
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.02962
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233949
reference_id 2233949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233949
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd
5
reference_url https://security.netapp.com/advisory/ntap-20231006-0008/
reference_id ntap-20231006-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/
url https://security.netapp.com/advisory/ntap-20231006-0008/
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29924
reference_id show_bug.cgi?id=29924
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29924
7
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
8
reference_url https://usn.ubuntu.com/6655-1/
reference_id USN-6655-1
reference_type
scores
url https://usn.ubuntu.com/6655-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-48063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxp6-cmpk-7uff
25
url VCID-dfhw-bvdv-4udd
vulnerability_id VCID-dfhw-bvdv-4udd
summary binutils: GNU Binutils Linker heap-based overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11495
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07164
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07294
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.0717
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07176
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07245
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07254
published_at 2026-04-12T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07271
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07244
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-07T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.0721
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402584
reference_id 2402584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402584
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16393
reference_id attachment.cgi?id=16393
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16393
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.327620
reference_id ?ctiid.327620
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://vuldb.com/?ctiid.327620
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
reference_id gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0
9
reference_url https://vuldb.com/?id.327620
reference_id ?id.327620
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://vuldb.com/?id.327620
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33502
reference_id show_bug.cgi?id=33502
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33502
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
reference_id show_bug.cgi?id=33502#c3
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3
13
reference_url https://vuldb.com/?submit.668290
reference_id ?submit.668290
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://vuldb.com/?submit.668290
14
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
15
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11495
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfhw-bvdv-4udd
26
url VCID-e8f4-9g99-6yet
vulnerability_id VCID-e8f4-9g99-6yet
summary binutils: memory leak in pr_function_type() in prdbg.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47010
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0256
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02673
published_at 2026-04-21T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02559
published_at 2026-04-16T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02564
published_at 2026-04-18T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02574
published_at 2026-04-04T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02577
published_at 2026-04-07T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02583
published_at 2026-04-08T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02603
published_at 2026-04-09T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02587
published_at 2026-04-11T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02575
published_at 2026-04-12T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02573
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233988
reference_id 2233988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233988
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29262
reference_id show_bug.cgi?id=29262
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:31:53Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29262
6
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47010
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8f4-9g99-6yet
27
url VCID-ek5t-65by-syac
vulnerability_id VCID-ek5t-65by-syac
summary binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1181
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.307
published_at 2026-04-02T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30535
published_at 2026-04-21T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.3057
published_at 2026-04-18T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30589
published_at 2026-04-16T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30563
published_at 2026-04-13T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.3061
published_at 2026-04-12T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30655
published_at 2026-04-11T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30651
published_at 2026-04-09T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30617
published_at 2026-04-08T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30558
published_at 2026-04-07T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30748
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
reference_id 1108986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344852
reference_id 2344852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344852
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15918
reference_id attachment.cgi?id=15918
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15918
7
reference_url https://vuldb.com/?ctiid.295084
reference_id ?ctiid.295084
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://vuldb.com/?ctiid.295084
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24
reference_id gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24
9
reference_url https://vuldb.com/?id.295084
reference_id ?id.295084
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://vuldb.com/?id.295084
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32643
reference_id show_bug.cgi?id=32643
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32643
11
reference_url https://vuldb.com/?submit.495402
reference_id ?submit.495402
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://vuldb.com/?submit.495402
12
reference_url https://usn.ubuntu.com/7423-1/
reference_id USN-7423-1
reference_type
scores
url https://usn.ubuntu.com/7423-1/
13
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1181
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5t-65by-syac
28
url VCID-f47d-fm3y-q3b9
vulnerability_id VCID-f47d-fm3y-q3b9
summary binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25584
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0268
published_at 2026-04-21T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02562
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.0258
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02585
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02606
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02589
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02578
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02576
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.0257
published_at 2026-04-18T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02577
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167467
reference_id 2167467
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2167467
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-25584
reference_id CVE-2023-25584
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/
url https://access.redhat.com/security/cve/CVE-2023-25584
10
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
reference_id gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
11
reference_url https://security.netapp.com/advisory/ntap-20231103-0002/
reference_id ntap-20231103-0002
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/
url https://security.netapp.com/advisory/ntap-20231103-0002/
12
reference_url https://usn.ubuntu.com/6101-1/
reference_id USN-6101-1
reference_type
scores
url https://usn.ubuntu.com/6101-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2023-25584
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f47d-fm3y-q3b9
29
url VCID-ftkb-qtse-afhq
vulnerability_id VCID-ftkb-qtse-afhq
summary binutils: nm: potential segmentation fault when displaying symbols without version info
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-57360
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04792
published_at 2026-04-21T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04711
published_at 2026-04-11T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04694
published_at 2026-04-12T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04677
published_at 2026-04-13T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04644
published_at 2026-04-16T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04652
published_at 2026-04-18T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04671
published_at 2026-04-07T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04705
published_at 2026-04-08T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04717
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05705
published_at 2026-04-02T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05746
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-57360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2339263
reference_id 2339263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2339263
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32467
reference_id show_bug.cgi?id=32467
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T15:50:28Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32467
6
reference_url https://usn.ubuntu.com/7306-1/
reference_id USN-7306-1
reference_type
scores
url https://usn.ubuntu.com/7306-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2024-57360
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftkb-qtse-afhq
30
url VCID-fx6h-7q2k-5fd2
vulnerability_id VCID-fx6h-7q2k-5fd2
summary Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1972
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15913
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15976
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15775
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15861
published_at 2026-04-08T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15923
published_at 2026-04-09T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17506
published_at 2026-04-13T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17558
published_at 2026-04-12T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17605
published_at 2026-04-11T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19214
published_at 2026-04-21T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19194
published_at 2026-04-16T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19203
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185646
reference_id 2185646
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2185646
5
reference_url https://security.gentoo.org/glsa/202309-15
reference_id GLSA-202309-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/
url https://security.gentoo.org/glsa/202309-15
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=30285
reference_id show_bug.cgi?id=30285
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=30285
7
reference_url https://usn.ubuntu.com/6101-1/
reference_id USN-6101-1
reference_type
scores
url https://usn.ubuntu.com/6101-1/
8
reference_url https://usn.ubuntu.com/6842-1/
reference_id USN-6842-1
reference_type
scores
url https://usn.ubuntu.com/6842-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2023-1972
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fx6h-7q2k-5fd2
31
url VCID-hd32-zxxu-6bh4
vulnerability_id VCID-hd32-zxxu-6bh4
summary binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11413
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06679
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06859
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06699
published_at 2026-04-18T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06709
published_at 2026-04-16T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06777
published_at 2026-04-13T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06708
published_at 2026-04-07T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06723
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06784
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06791
published_at 2026-04-11T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06759
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402423
reference_id 2402423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402423
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16362
reference_id attachment.cgi?id=16362
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16362
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.327349
reference_id ?ctiid.327349
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://vuldb.com/?ctiid.327349
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
reference_id gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0
9
reference_url https://vuldb.com/?id.327349
reference_id ?id.327349
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://vuldb.com/?id.327349
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33452
reference_id show_bug.cgi?id=33452
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33452
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10
reference_id show_bug.cgi?id=33456#c10
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10
13
reference_url https://vuldb.com/?submit.665587
reference_id ?submit.665587
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://vuldb.com/?submit.665587
14
reference_url https://vuldb.com/?submit.665590
reference_id ?submit.665590
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://vuldb.com/?submit.665590
15
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
16
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11413
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hd32-zxxu-6bh4
32
url VCID-hsyc-q23j-2ua3
vulnerability_id VCID-hsyc-q23j-2ua3
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20284
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25076
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.2516
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25202
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-11T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25846
published_at 2026-04-12T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25789
published_at 2026-04-13T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25792
published_at 2026-04-16T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-18T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25747
published_at 2026-04-21T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25752
published_at 2026-04-07T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25824
published_at 2026-04-08T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25875
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1937784
reference_id 1937784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1937784
5
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
6
reference_url https://access.redhat.com/errata/RHSA-2021:4364
reference_id RHSA-2021:4364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4364
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-20284
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsyc-q23j-2ua3
33
url VCID-j49e-hexk-7kgd
vulnerability_id VCID-j49e-hexk-7kgd
summary binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5244
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24041
published_at 2026-04-02T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23872
published_at 2026-04-21T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23902
published_at 2026-04-16T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23891
published_at 2026-04-18T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23948
published_at 2026-04-12T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23975
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23929
published_at 2026-04-08T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23862
published_at 2026-04-07T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.2408
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368763
reference_id 2368763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368763
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16010
reference_id attachment.cgi?id=16010
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16010
6
reference_url https://vuldb.com/?ctiid.310346
reference_id ?ctiid.310346
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://vuldb.com/?ctiid.310346
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5
reference_id gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5
8
reference_url https://vuldb.com/?id.310346
reference_id ?id.310346
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://vuldb.com/?id.310346
9
reference_url https://access.redhat.com/errata/RHSA-2025:20155
reference_id RHSA-2025:20155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20155
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32858
reference_id show_bug.cgi?id=32858
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32858
11
reference_url https://vuldb.com/?submit.584634
reference_id ?submit.584634
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://vuldb.com/?submit.584634
12
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
13
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-5244
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j49e-hexk-7kgd
34
url VCID-jm7b-4gnb-uygv
vulnerability_id VCID-jm7b-4gnb-uygv
summary binutils: GNU Binutils objdump.c disassemble_bytes stack-based overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0840
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27913
published_at 2026-04-02T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27954
published_at 2026-04-04T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27746
published_at 2026-04-07T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27814
published_at 2026-04-08T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27855
published_at 2026-04-09T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27862
published_at 2026-04-11T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-12T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27763
published_at 2026-04-13T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27769
published_at 2026-04-16T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27744
published_at 2026-04-18T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27703
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342875
reference_id 2342875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342875
5
reference_url https://usn.ubuntu.com/7306-1/
reference_id USN-7306-1
reference_type
scores
url https://usn.ubuntu.com/7306-1/
6
reference_url https://usn.ubuntu.com/7423-2/
reference_id USN-7423-2
reference_type
scores
url https://usn.ubuntu.com/7423-2/
7
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2025-0840
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7b-4gnb-uygv
35
url VCID-k4nr-2da1-jke3
vulnerability_id VCID-k4nr-2da1-jke3
summary binutils: heap-based buffer overflow in display_debug_section() in readelf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45703
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06715
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06557
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06548
published_at 2026-04-02T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06585
published_at 2026-04-04T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06569
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06619
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06662
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06654
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06646
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06638
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06565
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234012
reference_id 2234012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234012
4
reference_url https://security.netapp.com/advisory/ntap-20231006-0003/
reference_id ntap-20231006-0003
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/
url https://security.netapp.com/advisory/ntap-20231006-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29799
reference_id show_bug.cgi?id=29799
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29799
6
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-45703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4nr-2da1-jke3
36
url VCID-k6ey-kdwp-17ed
vulnerability_id VCID-k6ey-kdwp-17ed
summary binutils: GNU Binutils prdbg.c tg_tag_type return value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11839
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04191
published_at 2026-04-16T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04213
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0426
published_at 2026-04-08T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04229
published_at 2026-04-07T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.042
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04223
published_at 2026-04-13T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04245
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04261
published_at 2026-04-11T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04275
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06209
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404439
reference_id 2404439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404439
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16344
reference_id attachment.cgi?id=16344
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16344
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.328774
reference_id ?ctiid.328774
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://vuldb.com/?ctiid.328774
8
reference_url https://vuldb.com/?id.328774
reference_id ?id.328774
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://vuldb.com/?id.328774
9
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33448
reference_id show_bug.cgi?id=33448
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33448
11
reference_url https://vuldb.com/?submit.661279
reference_id ?submit.661279
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://vuldb.com/?submit.661279
12
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11839
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ey-kdwp-17ed
37
url VCID-kh2b-vdkt-nkep
vulnerability_id VCID-kh2b-vdkt-nkep
summary binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11414
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07164
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07294
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.0717
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07176
published_at 2026-04-16T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07245
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07254
published_at 2026-04-12T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07268
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07271
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07244
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-07T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.0721
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402424
reference_id 2402424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402424
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16361
reference_id attachment.cgi?id=16361
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16361
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
7
reference_url https://vuldb.com/?ctiid.327350
reference_id ?ctiid.327350
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://vuldb.com/?ctiid.327350
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
reference_id gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703
9
reference_url https://vuldb.com/?id.327350
reference_id ?id.327350
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://vuldb.com/?id.327350
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33450
reference_id show_bug.cgi?id=33450
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33450
12
reference_url https://vuldb.com/?submit.665591
reference_id ?submit.665591
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://vuldb.com/?submit.665591
13
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11414
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh2b-vdkt-nkep
38
url VCID-kvn8-qddz-vqag
vulnerability_id VCID-kvn8-qddz-vqag
summary binutils: memory leak in find_abstract_instance() in dwarf2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48065
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.0529
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05204
published_at 2026-04-12T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0519
published_at 2026-04-13T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05135
published_at 2026-04-16T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05138
published_at 2026-04-18T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-02T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05181
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05202
published_at 2026-04-07T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05234
published_at 2026-04-08T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05253
published_at 2026-04-09T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05221
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48065
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233963
reference_id 2233963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233963
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/
reference_id GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
reference_id KGSKF4GH7425S6XFDQMWTJGD5U47BAZN
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/
7
reference_url https://security.netapp.com/advisory/ntap-20231006-0008/
reference_id ntap-20231006-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/
url https://security.netapp.com/advisory/ntap-20231006-0008/
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29925
reference_id show_bug.cgi?id=29925
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29925
9
reference_url https://usn.ubuntu.com/6655-1/
reference_id USN-6655-1
reference_type
scores
url https://usn.ubuntu.com/6655-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-48065
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvn8-qddz-vqag
39
url VCID-mtb5-2vq5-4yf7
vulnerability_id VCID-mtb5-2vq5-4yf7
summary binutils: reachable assertion in display_debug_names() in dwarf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35205
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05401
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05243
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05323
published_at 2026-04-11T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05312
published_at 2026-04-12T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05301
published_at 2026-04-13T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05248
published_at 2026-04-16T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0525
published_at 2026-04-18T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-04T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05299
published_at 2026-04-07T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05334
published_at 2026-04-08T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05356
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233969
reference_id 2233969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233969
5
reference_url https://security.netapp.com/advisory/ntap-20231006-0010/
reference_id ntap-20231006-0010
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/
url https://security.netapp.com/advisory/ntap-20231006-0010/
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29289
reference_id show_bug.cgi?id=29289
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29289
7
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
8
reference_url https://usn.ubuntu.com/6544-1/
reference_id USN-6544-1
reference_type
scores
url https://usn.ubuntu.com/6544-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-35205
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtb5-2vq5-4yf7
40
url VCID-pejn-n3rz-33bs
vulnerability_id VCID-pejn-n3rz-33bs
summary binutils: Binutils: Out-of-bounds Write Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7546
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05712
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05753
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05749
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-12T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06459
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06422
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06541
published_at 2026-04-21T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06393
published_at 2026-04-18T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06384
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379793
reference_id 2379793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379793
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16118
reference_id attachment.cgi?id=16118
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16118
6
reference_url https://vuldb.com/?ctiid.316244
reference_id ?ctiid.316244
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://vuldb.com/?ctiid.316244
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b
reference_id gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b
8
reference_url https://vuldb.com/?id.316244
reference_id ?id.316244
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://vuldb.com/?id.316244
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33050
reference_id show_bug.cgi?id=33050
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33050
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2
reference_id show_bug.cgi?id=33050#c2
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2
11
reference_url https://vuldb.com/?submit.614375
reference_id ?submit.614375
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://vuldb.com/?submit.614375
12
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-7546
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pejn-n3rz-33bs
41
url VCID-pjtw-r398-uqgw
vulnerability_id VCID-pjtw-r398-uqgw
summary binutils: GNU Binutils format.c bfd_set_format memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1153
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24365
published_at 2026-04-11T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24323
published_at 2026-04-12T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24272
published_at 2026-04-18T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24282
published_at 2026-04-16T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24266
published_at 2026-04-13T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24248
published_at 2026-04-21T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25184
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25144
published_at 2026-04-02T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25069
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25025
published_at 2026-04-08T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24956
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344743
reference_id 2344743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344743
5
reference_url https://vuldb.com/?ctiid.295057
reference_id ?ctiid.295057
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://vuldb.com/?ctiid.295057
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
reference_id gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
7
reference_url https://vuldb.com/?id.295057
reference_id ?id.295057
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://vuldb.com/?id.295057
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32603
reference_id show_bug.cgi?id=32603
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32603
9
reference_url https://vuldb.com/?submit.489991
reference_id ?submit.489991
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://vuldb.com/?submit.489991
10
reference_url https://usn.ubuntu.com/7423-1/
reference_id USN-7423-1
reference_type
scores
url https://usn.ubuntu.com/7423-1/
11
reference_url https://usn.ubuntu.com/7423-2/
reference_id USN-7423-2
reference_type
scores
url https://usn.ubuntu.com/7423-2/
12
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1153
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjtw-r398-uqgw
42
url VCID-pkej-frsd-gqdk
vulnerability_id VCID-pkej-frsd-gqdk
summary binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-19726
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26971
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.27011
published_at 2026-04-02T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.268
published_at 2026-04-21T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26912
published_at 2026-04-12T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26855
published_at 2026-04-13T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26868
published_at 2026-04-16T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.27048
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-18T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26906
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26953
published_at 2026-04-09T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26957
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-19726
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233934
reference_id 2233934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233934
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=26240
reference_id show_bug.cgi?id=26240
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=26240
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=26241
reference_id show_bug.cgi?id=26241
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=26241
7
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
8
reference_url https://usn.ubuntu.com/6544-1/
reference_id USN-6544-1
reference_type
scores
url https://usn.ubuntu.com/6544-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2020-19726
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkej-frsd-gqdk
43
url VCID-q1nv-rtqz-4fhk
vulnerability_id VCID-q1nv-rtqz-4fhk
summary Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1579
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14762
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16505
published_at 2026-04-16T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16569
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16628
published_at 2026-04-12T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16669
published_at 2026-04-11T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1669
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16638
published_at 2026-04-08T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16762
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16553
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16511
published_at 2026-04-18T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19129
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1579
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180905
reference_id 2180905
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180905
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
6
reference_url https://security.gentoo.org/glsa/202309-15
reference_id GLSA-202309-15
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/
url https://security.gentoo.org/glsa/202309-15
7
reference_url https://security.netapp.com/advisory/ntap-20230511-0009/
reference_id ntap-20230511-0009
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/
url https://security.netapp.com/advisory/ntap-20230511-0009/
8
reference_url https://access.redhat.com/errata/RHSA-2024:2353
reference_id RHSA-2024:2353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2353
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29988
reference_id show_bug.cgi?id=29988
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29988
10
reference_url https://usn.ubuntu.com/6101-1/
reference_id USN-6101-1
reference_type
scores
url https://usn.ubuntu.com/6101-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2023-1579
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1nv-rtqz-4fhk
44
url VCID-r1u7-ujc5-g7aw
vulnerability_id VCID-r1u7-ujc5-g7aw
summary binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25586
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09196
published_at 2026-04-21T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09119
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09172
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09096
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09176
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09208
published_at 2026-04-11T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09177
published_at 2026-04-12T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09163
published_at 2026-04-13T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09058
published_at 2026-04-16T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09038
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167502
reference_id 2167502
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2167502
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-25586
reference_id CVE-2023-25586
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/
url https://access.redhat.com/security/cve/CVE-2023-25586
10
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502
reference_id gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502
11
reference_url https://security.netapp.com/advisory/ntap-20231103-0003/
reference_id ntap-20231103-0003
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/
url https://security.netapp.com/advisory/ntap-20231103-0003/
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29855
reference_id show_bug.cgi?id=29855
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29855
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2023-25586
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1u7-ujc5-g7aw
45
url VCID-rcs3-znj9-pbb8
vulnerability_id VCID-rcs3-znj9-pbb8
summary Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38533
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08367
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08419
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08342
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08413
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.0843
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08421
published_at 2026-04-21T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08402
published_at 2026-04-12T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08387
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08279
published_at 2026-04-16T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0826
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124569
reference_id 2124569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124569
5
reference_url https://security.gentoo.org/glsa/202309-15
reference_id GLSA-202309-15
reference_type
scores
url https://security.gentoo.org/glsa/202309-15
6
reference_url https://usn.ubuntu.com/5762-1/
reference_id USN-5762-1
reference_type
scores
url https://usn.ubuntu.com/5762-1/
7
reference_url https://usn.ubuntu.com/6544-1/
reference_id USN-6544-1
reference_type
scores
url https://usn.ubuntu.com/6544-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-38533
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcs3-znj9-pbb8
46
url VCID-rcxk-qvqu-y3fj
vulnerability_id VCID-rcxk-qvqu-y3fj
summary binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44840
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06597
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06768
published_at 2026-04-21T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0662
published_at 2026-04-16T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06613
published_at 2026-04-18T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06642
published_at 2026-04-04T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06621
published_at 2026-04-07T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.0667
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06704
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06703
published_at 2026-04-11T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06696
published_at 2026-04-12T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06687
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234004
reference_id 2234004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234004
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29732
reference_id show_bug.cgi?id=29732
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:15:25Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29732
6
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-44840
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcxk-qvqu-y3fj
47
url VCID-sdx4-5wtj-hbf9
vulnerability_id VCID-sdx4-5wtj-hbf9
summary binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1179
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.2858
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28386
published_at 2026-04-21T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28437
published_at 2026-04-18T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.2846
published_at 2026-04-16T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28443
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28533
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28492
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28425
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28623
published_at 2026-04-04T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30279
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344844
reference_id 2344844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344844
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15915
reference_id attachment.cgi?id=15915
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15915
6
reference_url https://vuldb.com/?ctiid.295082
reference_id ?ctiid.295082
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://vuldb.com/?ctiid.295082
7
reference_url https://vuldb.com/?id.295082
reference_id ?id.295082
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://vuldb.com/?id.295082
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32640
reference_id show_bug.cgi?id=32640
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32640
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1
reference_id show_bug.cgi?id=32640#c1
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1
10
reference_url https://vuldb.com/?submit.495376
reference_id ?submit.495376
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://vuldb.com/?submit.495376
11
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2025-1179
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sdx4-5wtj-hbf9
48
url VCID-syyt-ureu-23h8
vulnerability_id VCID-syyt-ureu-23h8
summary binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1147
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20892
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.207
published_at 2026-04-21T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20713
published_at 2026-04-18T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20717
published_at 2026-04-16T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20726
published_at 2026-04-13T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-12T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20821
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20803
published_at 2026-04-09T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20742
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20665
published_at 2026-04-07T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344647
reference_id 2344647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344647
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15881
reference_id attachment.cgi?id=15881
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15881
6
reference_url https://vuldb.com/?ctiid.295051
reference_id ?ctiid.295051
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://vuldb.com/?ctiid.295051
7
reference_url https://vuldb.com/?id.295051
reference_id ?id.295051
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://vuldb.com/?id.295051
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32556
reference_id show_bug.cgi?id=32556
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32556
9
reference_url https://vuldb.com/?submit.485254
reference_id ?submit.485254
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://vuldb.com/?submit.485254
10
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
11
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1147
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syyt-ureu-23h8
49
url VCID-t9qr-esv2-g7he
vulnerability_id VCID-t9qr-esv2-g7he
summary binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1176
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43862
published_at 2026-04-09T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43817
published_at 2026-04-21T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43883
published_at 2026-04-18T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43892
published_at 2026-04-16T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.4383
published_at 2026-04-13T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43847
published_at 2026-04-12T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.4388
published_at 2026-04-11T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43859
published_at 2026-04-08T12:55:00Z
8
value 0.00213
scoring_system epss
scoring_elements 0.43808
published_at 2026-04-07T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47501
published_at 2026-04-04T12:55:00Z
10
value 0.00243
scoring_system epss
scoring_elements 0.47481
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
reference_id 1108986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344833
reference_id 2344833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344833
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15913
reference_id attachment.cgi?id=15913
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15913
7
reference_url https://vuldb.com/?ctiid.295079
reference_id ?ctiid.295079
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://vuldb.com/?ctiid.295079
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814
reference_id gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814
9
reference_url https://vuldb.com/?id.295079
reference_id ?id.295079
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://vuldb.com/?id.295079
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32636
reference_id show_bug.cgi?id=32636
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32636
11
reference_url https://vuldb.com/?submit.495329
reference_id ?submit.495329
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://vuldb.com/?submit.495329
12
reference_url https://usn.ubuntu.com/7423-1/
reference_id USN-7423-1
reference_type
scores
url https://usn.ubuntu.com/7423-1/
13
reference_url https://usn.ubuntu.com/7423-2/
reference_id USN-7423-2
reference_type
scores
url https://usn.ubuntu.com/7423-2/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1176
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9qr-esv2-g7he
50
url VCID-tcc9-936c-vkhk
vulnerability_id VCID-tcc9-936c-vkhk
summary binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47008
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0256
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02673
published_at 2026-04-21T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02559
published_at 2026-04-16T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02564
published_at 2026-04-18T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02574
published_at 2026-04-04T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02577
published_at 2026-04-07T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02583
published_at 2026-04-08T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02603
published_at 2026-04-09T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02587
published_at 2026-04-11T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02575
published_at 2026-04-12T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02573
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233984
reference_id 2233984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233984
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20
reference_id show_bug.cgi?id=29255%20
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:13:36Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20
6
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47008
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcc9-936c-vkhk
51
url VCID-tmj2-8abu-fuen
vulnerability_id VCID-tmj2-8abu-fuen
summary binutils: GNU Binutils Linker heap-based overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11082
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05466
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.0564
published_at 2026-04-21T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-16T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05516
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05523
published_at 2026-04-12T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05535
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.0556
published_at 2026-04-09T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05538
published_at 2026-04-08T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05502
published_at 2026-04-07T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.055
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2399943
reference_id 2399943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2399943
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16358
reference_id attachment.cgi?id=16358
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16358
6
reference_url https://vuldb.com/?ctiid.326123
reference_id ?ctiid.326123
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://vuldb.com/?ctiid.326123
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
reference_id gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8
8
reference_url https://vuldb.com/?id.326123
reference_id ?id.326123
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://vuldb.com/?id.326123
9
reference_url https://access.redhat.com/errata/RHSA-2025:23306
reference_id RHSA-2025:23306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23306
10
reference_url https://access.redhat.com/errata/RHSA-2025:23405
reference_id RHSA-2025:23405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23405
11
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33464
reference_id show_bug.cgi?id=33464
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33464
13
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2
reference_id show_bug.cgi?id=33464#c2
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2
14
reference_url https://vuldb.com/?submit.661276
reference_id ?submit.661276
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://vuldb.com/?submit.661276
15
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
16
reference_url https://usn.ubuntu.com/7919-1/
reference_id USN-7919-1
reference_type
scores
url https://usn.ubuntu.com/7919-1/
17
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11082
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmj2-8abu-fuen
52
url VCID-ugns-tvmf-e7c7
vulnerability_id VCID-ugns-tvmf-e7c7
summary binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1010204
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34269
published_at 2026-04-01T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34608
published_at 2026-04-02T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34634
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34502
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34544
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34573
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34575
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34536
published_at 2026-04-12T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34512
published_at 2026-04-13T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.3455
published_at 2026-04-16T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34535
published_at 2026-04-18T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34497
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1010204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735604
reference_id 1735604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735604
5
reference_url https://access.redhat.com/errata/RHSA-2020:1797
reference_id RHSA-2020:1797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1797
6
reference_url https://usn.ubuntu.com/5349-1/
reference_id USN-5349-1
reference_type
scores
url https://usn.ubuntu.com/5349-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2019-1010204
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugns-tvmf-e7c7
53
url VCID-uqym-35ay-uua8
vulnerability_id VCID-uqym-35ay-uua8
summary Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4285
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17919
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17739
published_at 2026-04-21T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17974
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17674
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17762
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17824
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.1784
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17797
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17748
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17693
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17702
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150768
reference_id 2150768
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2150768
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
6
reference_url https://security.gentoo.org/glsa/202309-15
reference_id GLSA-202309-15
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/
url https://security.gentoo.org/glsa/202309-15
7
reference_url https://access.redhat.com/errata/RHSA-2023:2873
reference_id RHSA-2023:2873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2873
8
reference_url https://access.redhat.com/errata/RHSA-2023:3269
reference_id RHSA-2023:3269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3269
9
reference_url https://access.redhat.com/errata/RHSA-2023:6236
reference_id RHSA-2023:6236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6236
10
reference_url https://access.redhat.com/errata/RHSA-2023:6593
reference_id RHSA-2023:6593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6593
11
reference_url https://access.redhat.com/errata/RHSA-2023:7394
reference_id RHSA-2023:7394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7394
12
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29699
reference_id show_bug.cgi?id=29699
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29699
13
reference_url https://usn.ubuntu.com/6544-1/
reference_id USN-6544-1
reference_type
scores
url https://usn.ubuntu.com/6544-1/
14
reference_url https://usn.ubuntu.com/6842-1/
reference_id USN-6842-1
reference_type
scores
url https://usn.ubuntu.com/6842-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-4285
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqym-35ay-uua8
54
url VCID-uv5p-15z7-fqcn
vulnerability_id VCID-uv5p-15z7-fqcn
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3549
reference_id
reference_type
scores
0
value 0.00193
scoring_system epss
scoring_elements 0.41335
published_at 2026-04-04T12:55:00Z
1
value 0.00193
scoring_system epss
scoring_elements 0.41213
published_at 2026-04-01T12:55:00Z
2
value 0.00193
scoring_system epss
scoring_elements 0.41259
published_at 2026-04-07T12:55:00Z
3
value 0.00193
scoring_system epss
scoring_elements 0.41307
published_at 2026-04-02T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57143
published_at 2026-04-21T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57141
published_at 2026-04-13T12:55:00Z
6
value 0.00346
scoring_system epss
scoring_elements 0.57164
published_at 2026-04-18T12:55:00Z
7
value 0.00346
scoring_system epss
scoring_elements 0.57168
published_at 2026-04-16T12:55:00Z
8
value 0.00346
scoring_system epss
scoring_elements 0.5717
published_at 2026-04-09T12:55:00Z
9
value 0.00346
scoring_system epss
scoring_elements 0.57182
published_at 2026-04-11T12:55:00Z
10
value 0.00346
scoring_system epss
scoring_elements 0.57161
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3549
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1960717
reference_id 1960717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1960717
5
reference_url https://security.archlinux.org/AVG-2002
reference_id AVG-2002
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2002
6
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-3549
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uv5p-15z7-fqcn
55
url VCID-vcgu-7pzk-2udx
vulnerability_id VCID-vcgu-7pzk-2udx
summary binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1148
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19053
published_at 2026-04-21T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21858
published_at 2026-04-18T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.2185
published_at 2026-04-16T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21848
published_at 2026-04-13T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22038
published_at 2026-04-04T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-02T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21946
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21934
published_at 2026-04-09T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21878
published_at 2026-04-08T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21803
published_at 2026-04-07T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21905
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1148
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344652
reference_id 2344652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344652
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15887
reference_id attachment.cgi?id=15887
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15887
6
reference_url https://vuldb.com/?ctiid.295052
reference_id ?ctiid.295052
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://vuldb.com/?ctiid.295052
7
reference_url https://vuldb.com/?id.295052
reference_id ?id.295052
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://vuldb.com/?id.295052
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
reference_id show_bug.cgi?id=32576
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
9
reference_url https://vuldb.com/?submit.485747
reference_id ?submit.485747
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://vuldb.com/?submit.485747
10
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
11
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1148
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcgu-7pzk-2udx
56
url VCID-vj46-k8jn-a7ew
vulnerability_id VCID-vj46-k8jn-a7ew
summary binutils: memory leak in stab_demangle_v3_arg() in stabs.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47007
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00862
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00906
published_at 2026-04-21T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00851
published_at 2026-04-16T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00857
published_at 2026-04-18T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-04T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-07T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00869
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00867
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00856
published_at 2026-04-11T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.0085
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233980
reference_id 2233980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233980
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29254
reference_id show_bug.cgi?id=29254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:14:11Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29254
6
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
7
reference_url https://usn.ubuntu.com/6581-1/
reference_id USN-6581-1
reference_type
scores
url https://usn.ubuntu.com/6581-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47007
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vj46-k8jn-a7ew
57
url VCID-vjrz-ss5c-skcc
vulnerability_id VCID-vjrz-ss5c-skcc
summary binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53589
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39547
published_at 2026-04-21T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39661
published_at 2026-04-11T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39625
published_at 2026-04-12T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39609
published_at 2026-04-13T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39659
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39631
published_at 2026-04-18T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-02T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-04T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39584
published_at 2026-04-07T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39638
published_at 2026-04-08T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39652
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330669
reference_id 2330669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330669
5
reference_url https://www.gnu.org/software/binutils/
reference_id binutils
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/
url https://www.gnu.org/software/binutils/
6
reference_url https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/
reference_id binutils-objdump-tekhex-buffer-overflow
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/
url https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
aliases CVE-2024-53589
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjrz-ss5c-skcc
58
url VCID-vwk2-2pwb-muhu
vulnerability_id VCID-vwk2-2pwb-muhu
summary binutils: GNU Binutils out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11840
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07986
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08075
published_at 2026-04-21T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07916
published_at 2026-04-18T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07931
published_at 2026-04-16T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08018
published_at 2026-04-13T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08035
published_at 2026-04-12T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08055
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08071
published_at 2026-04-09T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08052
published_at 2026-04-08T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07991
published_at 2026-04-07T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08032
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2404481
reference_id 2404481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2404481
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16351
reference_id attachment.cgi?id=16351
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16351
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16357
reference_id attachment.cgi?id=16357
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16357
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
8
reference_url https://vuldb.com/?ctiid.328775
reference_id ?ctiid.328775
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://vuldb.com/?ctiid.328775
9
reference_url https://vuldb.com/?id.328775
reference_id ?id.328775
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://vuldb.com/?id.328775
10
reference_url https://access.redhat.com/errata/RHSA-2026:7098
reference_id RHSA-2026:7098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7098
11
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33455
reference_id show_bug.cgi?id=33455
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33455
12
reference_url https://vuldb.com/?submit.661281
reference_id ?submit.661281
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://vuldb.com/?submit.661281
13
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
14
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-11840
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwk2-2pwb-muhu
59
url VCID-wj3y-5jmt-7ugw
vulnerability_id VCID-wj3y-5jmt-7ugw
summary binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1180
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24108
published_at 2026-04-02T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.23941
published_at 2026-04-21T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-18T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2397
published_at 2026-04-16T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.23959
published_at 2026-04-13T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24015
published_at 2026-04-12T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24058
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24041
published_at 2026-04-09T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.23994
published_at 2026-04-08T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.23927
published_at 2026-04-07T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24146
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
reference_id 1108986
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344846
reference_id 2344846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344846
6
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15917
reference_id attachment.cgi?id=15917
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15917
7
reference_url https://vuldb.com/?ctiid.295083
reference_id ?ctiid.295083
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://vuldb.com/?ctiid.295083
8
reference_url https://vuldb.com/?id.295083
reference_id ?id.295083
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://vuldb.com/?id.295083
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32642
reference_id show_bug.cgi?id=32642
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32642
10
reference_url https://vuldb.com/?submit.495381
reference_id ?submit.495381
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://vuldb.com/?submit.495381
11
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1180
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3y-5jmt-7ugw
60
url VCID-x3kv-wwqy-8bav
vulnerability_id VCID-x3kv-wwqy-8bav
summary binutils: GNU Binutils objdump bucomm.c display_info memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3198
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21148
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20944
published_at 2026-04-21T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20965
published_at 2026-04-18T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20977
published_at 2026-04-13T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21029
published_at 2026-04-12T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21072
published_at 2026-04-11T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21056
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20996
published_at 2026-04-08T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-07T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21202
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357358
reference_id 2357358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357358
5
reference_url https://vuldb.com/?ctiid.303151
reference_id ?ctiid.303151
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://vuldb.com/?ctiid.303151
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
reference_id gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
7
reference_url https://vuldb.com/?id.303151
reference_id ?id.303151
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://vuldb.com/?id.303151
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32716
reference_id show_bug.cgi?id=32716
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32716
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
reference_id show_bug.cgi?id=32716#c0
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0
10
reference_url https://vuldb.com/?submit.545773
reference_id ?submit.545773
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://vuldb.com/?submit.545773
11
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
12
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
13
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-3198
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3kv-wwqy-8bav
61
url VCID-xdh7-9hu5-vfa6
vulnerability_id VCID-xdh7-9hu5-vfa6
summary binutils: segmentation fault in compare_symbols() in objdump.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47696
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03675
published_at 2026-04-21T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03609
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03536
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03549
published_at 2026-04-18T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03625
published_at 2026-04-04T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03633
published_at 2026-04-07T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03635
published_at 2026-04-08T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03656
published_at 2026-04-09T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03614
published_at 2026-04-11T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03587
published_at 2026-04-12T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03563
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234029
reference_id 2234029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234029
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=29677
reference_id show_bug.cgi?id=29677
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:26:58Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=29677
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2022-47696
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdh7-9hu5-vfa6
62
url VCID-y2a1-fczv-k7e2
vulnerability_id VCID-y2a1-fczv-k7e2
summary binutils: GNU Binutils ld xmemdup.c xmemdup memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1151
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14854
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14947
published_at 2026-04-12T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1489
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14789
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14796
published_at 2026-04-18T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23125
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23218
published_at 2026-04-02T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23199
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23178
published_at 2026-04-09T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23262
published_at 2026-04-04T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23052
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344713
reference_id 2344713
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344713
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15887
reference_id attachment.cgi?id=15887
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15887
6
reference_url https://vuldb.com/?ctiid.295055
reference_id ?ctiid.295055
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/
url https://vuldb.com/?ctiid.295055
7
reference_url https://vuldb.com/?id.295055
reference_id ?id.295055
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/
url https://vuldb.com/?id.295055
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
reference_id show_bug.cgi?id=32576
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
9
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1151
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2a1-fczv-k7e2
63
url VCID-ycgk-1xz6-h3fm
vulnerability_id VCID-ycgk-1xz6-h3fm
summary binutils: Binutils: Heap Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7545
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06162
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06193
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06175
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07174
published_at 2026-04-13T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07183
published_at 2026-04-12T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07194
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07165
published_at 2026-04-08T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07196
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07213
published_at 2026-04-21T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07088
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379785
reference_id 2379785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379785
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=16117
reference_id attachment.cgi?id=16117
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=16117
6
reference_url https://vuldb.com/?ctiid.316243
reference_id ?ctiid.316243
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://vuldb.com/?ctiid.316243
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
reference_id gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944
8
reference_url https://vuldb.com/?id.316243
reference_id ?id.316243
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://vuldb.com/?id.316243
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33049
reference_id show_bug.cgi?id=33049
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33049
10
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
reference_id show_bug.cgi?id=33049#c1
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1
11
reference_url https://vuldb.com/?submit.614355
reference_id ?submit.614355
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://vuldb.com/?submit.614355
12
reference_url https://usn.ubuntu.com/7718-1/
reference_id USN-7718-1
reference_type
scores
url https://usn.ubuntu.com/7718-1/
13
reference_url https://usn.ubuntu.com/7847-1/
reference_id USN-7847-1
reference_type
scores
url https://usn.ubuntu.com/7847-1/
14
reference_url https://usn.ubuntu.com/7899-1/
reference_id USN-7899-1
reference_type
scores
url https://usn.ubuntu.com/7899-1/
15
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-7545
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycgk-1xz6-h3fm
64
url VCID-z1d7-yjdv-hyh8
vulnerability_id VCID-z1d7-yjdv-hyh8
summary binutils: GNU Binutils ld xmalloc.c xstrdup memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1149
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14854
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14947
published_at 2026-04-12T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.1489
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14789
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14796
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15827
published_at 2026-04-11T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15704
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15789
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15838
published_at 2026-04-02T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15848
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1149
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344651
reference_id 2344651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344651
5
reference_url https://sourceware.org/bugzilla/attachment.cgi?id=15887
reference_id attachment.cgi?id=15887
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/
url https://sourceware.org/bugzilla/attachment.cgi?id=15887
6
reference_url https://vuldb.com/?ctiid.295053
reference_id ?ctiid.295053
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/
url https://vuldb.com/?ctiid.295053
7
reference_url https://vuldb.com/?id.295053
reference_id ?id.295053
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/
url https://vuldb.com/?id.295053
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
reference_id show_bug.cgi?id=32576
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=32576
9
reference_url https://www.gnu.org/
reference_id www.gnu.org
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
2
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/
url https://www.gnu.org/
fixed_packages
0
url pkg:deb/debian/binutils@2.43.1-5
purl pkg:deb/debian/binutils@2.43.1-5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5
1
url pkg:deb/debian/binutils@2.45.50.20251125-1
purl pkg:deb/debian/binutils@2.45.50.20251125-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1
aliases CVE-2025-1149
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1d7-yjdv-hyh8
65
url VCID-znqk-35mz-dqfk
vulnerability_id VCID-znqk-35mz-dqfk
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20197
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30284
published_at 2026-04-01T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30138
published_at 2026-04-21T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30313
published_at 2026-04-02T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30361
published_at 2026-04-04T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30177
published_at 2026-04-07T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30238
published_at 2026-04-08T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30272
published_at 2026-04-09T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30275
published_at 2026-04-11T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30232
published_at 2026-04-12T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30186
published_at 2026-04-13T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.302
published_at 2026-04-16T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30181
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1913743
reference_id 1913743
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1913743
5
reference_url https://security.archlinux.org/AVG-1540
reference_id AVG-1540
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1540
6
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/
url https://security.gentoo.org/glsa/202208-30
7
reference_url https://security.netapp.com/advisory/ntap-20210528-0009/
reference_id ntap-20210528-0009
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/
url https://security.netapp.com/advisory/ntap-20210528-0009/
8
reference_url https://access.redhat.com/errata/RHSA-2021:4364
reference_id RHSA-2021:4364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4364
9
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=26945
reference_id show_bug.cgi?id=26945
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=26945
fixed_packages
0
url pkg:deb/debian/binutils@2.40-2
purl pkg:deb/debian/binutils@2.40-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-4d5t-1hwt-43at
2
vulnerability VCID-4k1k-tmj9-zyar
3
vulnerability VCID-6kvf-hsu3-nfc3
4
vulnerability VCID-6v51-g3b9-3qbf
5
vulnerability VCID-7vbm-bp51-4faa
6
vulnerability VCID-84t7-666n-fydn
7
vulnerability VCID-88yz-vyfa-xuec
8
vulnerability VCID-8p5q-y7th-e7a3
9
vulnerability VCID-a6f4-kkt1-yugs
10
vulnerability VCID-b7k7-s2rd-j3h1
11
vulnerability VCID-dfhw-bvdv-4udd
12
vulnerability VCID-ek5t-65by-syac
13
vulnerability VCID-ftkb-qtse-afhq
14
vulnerability VCID-fx6h-7q2k-5fd2
15
vulnerability VCID-hd32-zxxu-6bh4
16
vulnerability VCID-j49e-hexk-7kgd
17
vulnerability VCID-jm7b-4gnb-uygv
18
vulnerability VCID-k6ey-kdwp-17ed
19
vulnerability VCID-kh2b-vdkt-nkep
20
vulnerability VCID-pejn-n3rz-33bs
21
vulnerability VCID-pjtw-r398-uqgw
22
vulnerability VCID-sdx4-5wtj-hbf9
23
vulnerability VCID-syyt-ureu-23h8
24
vulnerability VCID-t9qr-esv2-g7he
25
vulnerability VCID-tmj2-8abu-fuen
26
vulnerability VCID-vcgu-7pzk-2udx
27
vulnerability VCID-vjrz-ss5c-skcc
28
vulnerability VCID-vwk2-2pwb-muhu
29
vulnerability VCID-wj3y-5jmt-7ugw
30
vulnerability VCID-x3kv-wwqy-8bav
31
vulnerability VCID-y2a1-fczv-k7e2
32
vulnerability VCID-ycgk-1xz6-h3fm
33
vulnerability VCID-z1d7-yjdv-hyh8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2
aliases CVE-2021-20197
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znqk-35mz-dqfk
Fixing_vulnerabilities
0
url VCID-vepg-jnnm-97d7
vulnerability_id VCID-vepg-jnnm-97d7
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20294
reference_id
reference_type
scores
0
value 0.1586
scoring_system epss
scoring_elements 0.9472
published_at 2026-04-02T12:55:00Z
1
value 0.1586
scoring_system epss
scoring_elements 0.94712
published_at 2026-04-01T12:55:00Z
2
value 0.1586
scoring_system epss
scoring_elements 0.94724
published_at 2026-04-04T12:55:00Z
3
value 0.22712
scoring_system epss
scoring_elements 0.95883
published_at 2026-04-21T12:55:00Z
4
value 0.22712
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-16T12:55:00Z
5
value 0.22712
scoring_system epss
scoring_elements 0.95881
published_at 2026-04-18T12:55:00Z
6
value 0.22712
scoring_system epss
scoring_elements 0.95848
published_at 2026-04-07T12:55:00Z
7
value 0.22712
scoring_system epss
scoring_elements 0.95857
published_at 2026-04-08T12:55:00Z
8
value 0.22712
scoring_system epss
scoring_elements 0.9586
published_at 2026-04-09T12:55:00Z
9
value 0.22712
scoring_system epss
scoring_elements 0.95863
published_at 2026-04-12T12:55:00Z
10
value 0.22712
scoring_system epss
scoring_elements 0.95864
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1943533
reference_id 1943533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1943533
5
reference_url https://security.archlinux.org/AVG-1385
reference_id AVG-1385
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1385
6
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
fixed_packages
0
url pkg:deb/debian/binutils@2.35.2-2
purl pkg:deb/debian/binutils@2.35.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-2sxq-338y-zudp
2
vulnerability VCID-3abw-ksjw-hkff
3
vulnerability VCID-3j3x-b5s8-p7c1
4
vulnerability VCID-4d5t-1hwt-43at
5
vulnerability VCID-4k1k-tmj9-zyar
6
vulnerability VCID-4uea-bxbr-2kdz
7
vulnerability VCID-5cqh-f862-zugq
8
vulnerability VCID-5rak-8wp8-hqcm
9
vulnerability VCID-66e8-kf7g-2bcv
10
vulnerability VCID-6cjq-sz9f-mqf9
11
vulnerability VCID-6kvf-hsu3-nfc3
12
vulnerability VCID-6v51-g3b9-3qbf
13
vulnerability VCID-7sc8-fzw3-vfer
14
vulnerability VCID-7vbm-bp51-4faa
15
vulnerability VCID-84t7-666n-fydn
16
vulnerability VCID-88yz-vyfa-xuec
17
vulnerability VCID-8p5q-y7th-e7a3
18
vulnerability VCID-9v6f-mzak-87d6
19
vulnerability VCID-a6f4-kkt1-yugs
20
vulnerability VCID-b7k7-s2rd-j3h1
21
vulnerability VCID-bmef-m4dw-kbeu
22
vulnerability VCID-by8y-uamt-f7bt
23
vulnerability VCID-cjbb-xm4r-c3b5
24
vulnerability VCID-cxp6-cmpk-7uff
25
vulnerability VCID-dfhw-bvdv-4udd
26
vulnerability VCID-e8f4-9g99-6yet
27
vulnerability VCID-ek5t-65by-syac
28
vulnerability VCID-f47d-fm3y-q3b9
29
vulnerability VCID-ftkb-qtse-afhq
30
vulnerability VCID-fx6h-7q2k-5fd2
31
vulnerability VCID-hd32-zxxu-6bh4
32
vulnerability VCID-hsyc-q23j-2ua3
33
vulnerability VCID-j49e-hexk-7kgd
34
vulnerability VCID-jm7b-4gnb-uygv
35
vulnerability VCID-k4nr-2da1-jke3
36
vulnerability VCID-k6ey-kdwp-17ed
37
vulnerability VCID-kh2b-vdkt-nkep
38
vulnerability VCID-kvn8-qddz-vqag
39
vulnerability VCID-mtb5-2vq5-4yf7
40
vulnerability VCID-pejn-n3rz-33bs
41
vulnerability VCID-pjtw-r398-uqgw
42
vulnerability VCID-pkej-frsd-gqdk
43
vulnerability VCID-q1nv-rtqz-4fhk
44
vulnerability VCID-r1u7-ujc5-g7aw
45
vulnerability VCID-rcs3-znj9-pbb8
46
vulnerability VCID-rcxk-qvqu-y3fj
47
vulnerability VCID-sdx4-5wtj-hbf9
48
vulnerability VCID-syyt-ureu-23h8
49
vulnerability VCID-t9qr-esv2-g7he
50
vulnerability VCID-tcc9-936c-vkhk
51
vulnerability VCID-tmj2-8abu-fuen
52
vulnerability VCID-ugns-tvmf-e7c7
53
vulnerability VCID-uqym-35ay-uua8
54
vulnerability VCID-uv5p-15z7-fqcn
55
vulnerability VCID-vcgu-7pzk-2udx
56
vulnerability VCID-vj46-k8jn-a7ew
57
vulnerability VCID-vjrz-ss5c-skcc
58
vulnerability VCID-vwk2-2pwb-muhu
59
vulnerability VCID-wj3y-5jmt-7ugw
60
vulnerability VCID-x3kv-wwqy-8bav
61
vulnerability VCID-xdh7-9hu5-vfa6
62
vulnerability VCID-y2a1-fczv-k7e2
63
vulnerability VCID-ycgk-1xz6-h3fm
64
vulnerability VCID-z1d7-yjdv-hyh8
65
vulnerability VCID-znqk-35mz-dqfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2
aliases CVE-2021-20294
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2