Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582404?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "type": "deb", "namespace": "debian", "name": "binutils", "version": "2.40-2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.43.1-5", "latest_non_vulnerable_version": "2.45.50.20251125-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71877?format=api", "vulnerability_id": "VCID-2feg-zk6f-jqax", "summary": "binutils: GNU Binutils ld elflink.c bfd_elf_reloc_symbol_deleted_p memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28297", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28284", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28338", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28479", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986", "reference_id": "1108986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344853", "reference_id": "2344853", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344853" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15919", "reference_id": "attachment.cgi?id=15919", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15919" }, { "reference_url": "https://vuldb.com/?ctiid.295086", "reference_id": "?ctiid.295086", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://vuldb.com/?ctiid.295086" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad" }, { "reference_url": "https://vuldb.com/?id.295086", "reference_id": "?id.295086", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://vuldb.com/?id.295086" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32644", "reference_id": "show_bug.cgi?id=32644", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32644" }, { "reference_url": "https://vuldb.com/?submit.495407", "reference_id": "?submit.495407", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://vuldb.com/?submit.495407" }, { "reference_url": "https://usn.ubuntu.com/7423-1/", "reference_id": "USN-7423-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-1/" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1182" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2feg-zk6f-jqax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67405?format=api", "vulnerability_id": "VCID-4d5t-1hwt-43at", "summary": "binutils: GNU Binutils out-of-bounds read", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11081", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0721", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399944", "reference_id": "2399944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399944" }, { "reference_url": "https://vuldb.com/?ctiid.326122", "reference_id": "?ctiid.326122", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://vuldb.com/?ctiid.326122" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b" }, { "reference_url": "https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt", "reference_id": "hdf5_crash_3.txt", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt" }, { "reference_url": "https://vuldb.com/?id.326122", "reference_id": "?id.326122", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://vuldb.com/?id.326122" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33406", "reference_id": "show_bug.cgi?id=33406", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33406" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2", "reference_id": "show_bug.cgi?id=33406#c2", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2" }, { "reference_url": "https://vuldb.com/?submit.661275", "reference_id": "?submit.661275", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://vuldb.com/?submit.661275" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11081" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d5t-1hwt-43at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71890?format=api", "vulnerability_id": "VCID-4k1k-tmj9-zyar", "summary": "binutils: GNU Binutils ld xstrdup.c xstrdup memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15838", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15848", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23199", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344723", "reference_id": "2344723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344723" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", "reference_id": "attachment.cgi?id=15887", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887" }, { "reference_url": "https://vuldb.com/?ctiid.295056", "reference_id": "?ctiid.295056", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/" } ], "url": "https://vuldb.com/?ctiid.295056" }, { "reference_url": "https://vuldb.com/?id.295056", "reference_id": "?id.295056", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/" } ], "url": "https://vuldb.com/?id.295056" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", "reference_id": "show_bug.cgi?id=32576", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1152" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4k1k-tmj9-zyar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68484?format=api", "vulnerability_id": "VCID-6kvf-hsu3-nfc3", "summary": "binutils: Binutils DWARF Section Handler Memory Leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8225", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06446", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06522", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06471", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08345", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08452", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383686", "reference_id": "2383686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383686" }, { "reference_url": "https://vuldb.com/?ctiid.317813", "reference_id": "?ctiid.317813", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/" } ], "url": "https://vuldb.com/?ctiid.317813" }, { "reference_url": "https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4", "reference_id": "e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/" } ], "url": "https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4" }, { "reference_url": "https://vuldb.com/?id.317813", "reference_id": "?id.317813", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/" } ], "url": "https://vuldb.com/?id.317813" }, { "reference_url": "https://vuldb.com/?submit.621883", "reference_id": "?submit.621883", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/" } ], "url": "https://vuldb.com/?submit.621883" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-8225" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kvf-hsu3-nfc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68485?format=api", "vulnerability_id": "VCID-6v51-g3b9-3qbf", "summary": "binutils: Binutils BFD Null Pointer Dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8224", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08678", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08661", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11105", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383679", "reference_id": "2383679", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383679" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15680", "reference_id": "attachment.cgi?id=15680", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15680" }, { "reference_url": "https://vuldb.com/?ctiid.317812", "reference_id": "?ctiid.317812", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://vuldb.com/?ctiid.317812" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530" }, { "reference_url": "https://vuldb.com/?id.317812", "reference_id": "?id.317812", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://vuldb.com/?id.317812" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32109", "reference_id": "show_bug.cgi?id=32109", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32109" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2", "reference_id": "show_bug.cgi?id=32109#c2", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2" }, { "reference_url": "https://vuldb.com/?submit.621878", "reference_id": "?submit.621878", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://vuldb.com/?submit.621878" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2025-8224" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6v51-g3b9-3qbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71881?format=api", "vulnerability_id": "VCID-7vbm-bp51-4faa", "summary": "binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30979", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31127", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986", "reference_id": "1108986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344834", "reference_id": "2344834", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344834" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15914", "reference_id": "attachment.cgi?id=15914", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15914" }, { "reference_url": "https://vuldb.com/?ctiid.295081", "reference_id": "?ctiid.295081", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://vuldb.com/?ctiid.295081" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0" }, { "reference_url": "https://vuldb.com/?id.295081", "reference_id": "?id.295081", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://vuldb.com/?id.295081" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32638", "reference_id": "show_bug.cgi?id=32638", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32638" }, { "reference_url": "https://vuldb.com/?submit.495369", "reference_id": "?submit.495369", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://vuldb.com/?submit.495369" }, { "reference_url": "https://usn.ubuntu.com/7423-1/", "reference_id": "USN-7423-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1178" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vbm-bp51-4faa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66929?format=api", "vulnerability_id": "VCID-84t7-666n-fydn", "summary": "binutils: GNU Binutils Linker out-of-bounds read", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09982", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10006", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402559", "reference_id": "2402559", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402559" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16389", "reference_id": "attachment.cgi?id=16389", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16389" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.327619", "reference_id": "?ctiid.327619", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://vuldb.com/?ctiid.327619" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a" }, { "reference_url": "https://vuldb.com/?id.327619", "reference_id": "?id.327619", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://vuldb.com/?id.327619" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33499", "reference_id": "show_bug.cgi?id=33499", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33499" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2", "reference_id": "show_bug.cgi?id=33499#c2", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2" }, { "reference_url": "https://vuldb.com/?submit.668281", "reference_id": "?submit.668281", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://vuldb.com/?submit.668281" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11494" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84t7-666n-fydn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69492?format=api", "vulnerability_id": "VCID-88yz-vyfa-xuec", "summary": "binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5245", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.2459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24428", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24486", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24529", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24471", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5245" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368771", "reference_id": "2368771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368771" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16004", "reference_id": "attachment.cgi?id=16004", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16004" }, { "reference_url": "https://vuldb.com/?ctiid.310347", "reference_id": "?ctiid.310347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://vuldb.com/?ctiid.310347" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a" }, { "reference_url": "https://vuldb.com/?id.310347", "reference_id": "?id.310347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://vuldb.com/?id.310347" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32829", "reference_id": "show_bug.cgi?id=32829", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32829" }, { "reference_url": "https://vuldb.com/?submit.584635", "reference_id": "?submit.584635", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://vuldb.com/?submit.584635" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-5245" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88yz-vyfa-xuec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66933?format=api", "vulnerability_id": "VCID-8p5q-y7th-e7a3", "summary": "binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0721", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402425", "reference_id": "2402425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402425" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16378", "reference_id": "attachment.cgi?id=16378", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16378" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.327348", "reference_id": "?ctiid.327348", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://vuldb.com/?ctiid.327348" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc" }, { "reference_url": "https://vuldb.com/?id.327348", "reference_id": "?id.327348", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://vuldb.com/?id.327348" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452", "reference_id": "show_bug.cgi?id=33452", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8", "reference_id": "show_bug.cgi?id=33452#c8", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11412" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p5q-y7th-e7a3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67403?format=api", "vulnerability_id": "VCID-a6f4-kkt1-yugs", "summary": "binutils: GNU Binutils Linker heap-based overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06365", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06389", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0645", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06431", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06383", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06394", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399948", "reference_id": "2399948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399948" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16353", "reference_id": "attachment.cgi?id=16353", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16353" }, { "reference_url": "https://vuldb.com/?ctiid.326124", "reference_id": "?ctiid.326124", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://vuldb.com/?ctiid.326124" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490" }, { "reference_url": "https://vuldb.com/?id.326124", "reference_id": "?id.326124", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://vuldb.com/?id.326124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23232", "reference_id": "RHSA-2025:23232", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23232" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23233", "reference_id": "RHSA-2025:23233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23306", "reference_id": "RHSA-2025:23306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23336", "reference_id": "RHSA-2025:23336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23343", "reference_id": "RHSA-2025:23343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23359", "reference_id": "RHSA-2025:23359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23359" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23382", "reference_id": "RHSA-2025:23382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23400", "reference_id": "RHSA-2025:23400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23405", "reference_id": "RHSA-2025:23405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0052", "reference_id": "RHSA-2026:0052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0108", "reference_id": "RHSA-2026:0108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0341", "reference_id": "RHSA-2026:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0342", "reference_id": "RHSA-2026:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0343", "reference_id": "RHSA-2026:0343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0479", "reference_id": "RHSA-2026:0479", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0479" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0480", "reference_id": "RHSA-2026:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0481", "reference_id": "RHSA-2026:0481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0482", "reference_id": "RHSA-2026:0482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0685", "reference_id": "RHSA-2026:0685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0978", "reference_id": "RHSA-2026:0978", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0978" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1359", "reference_id": "RHSA-2026:1359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1359" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1539", "reference_id": "RHSA-2026:1539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2627", "reference_id": "RHSA-2026:2627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2627" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457", "reference_id": "show_bug.cgi?id=33457", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1", "reference_id": "show_bug.cgi?id=33457#c1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1" }, { "reference_url": "https://vuldb.com/?submit.661277", "reference_id": "?submit.661277", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://vuldb.com/?submit.661277" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11083" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6f4-kkt1-yugs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71892?format=api", "vulnerability_id": "VCID-b7k7-s2rd-j3h1", "summary": "binutils: GNU Binutils ld libbfd.c bfd_malloc memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15076", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1502", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1489", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344681", "reference_id": "2344681", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344681" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", "reference_id": "attachment.cgi?id=15887", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887" }, { "reference_url": "https://vuldb.com/?ctiid.295054", "reference_id": "?ctiid.295054", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/" } ], "url": "https://vuldb.com/?ctiid.295054" }, { "reference_url": "https://vuldb.com/?id.295054", "reference_id": "?id.295054", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/" } ], "url": "https://vuldb.com/?id.295054" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", "reference_id": "show_bug.cgi?id=32576", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1150" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7k7-s2rd-j3h1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66928?format=api", "vulnerability_id": "VCID-dfhw-bvdv-4udd", "summary": "binutils: GNU Binutils Linker heap-based overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0721", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402584", "reference_id": "2402584", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402584" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16393", "reference_id": "attachment.cgi?id=16393", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16393" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.327620", "reference_id": "?ctiid.327620", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://vuldb.com/?ctiid.327620" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0" }, { "reference_url": "https://vuldb.com/?id.327620", "reference_id": "?id.327620", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://vuldb.com/?id.327620" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33502", "reference_id": "show_bug.cgi?id=33502", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33502" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3", "reference_id": "show_bug.cgi?id=33502#c3", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3" }, { "reference_url": "https://vuldb.com/?submit.668290", "reference_id": "?submit.668290", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://vuldb.com/?submit.668290" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11495" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfhw-bvdv-4udd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71878?format=api", "vulnerability_id": "VCID-ek5t-65by-syac", "summary": "binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30589", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3061", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30748", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986", "reference_id": "1108986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344852", "reference_id": "2344852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344852" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15918", "reference_id": "attachment.cgi?id=15918", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15918" }, { "reference_url": "https://vuldb.com/?ctiid.295084", "reference_id": "?ctiid.295084", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://vuldb.com/?ctiid.295084" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24" }, { "reference_url": "https://vuldb.com/?id.295084", "reference_id": "?id.295084", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://vuldb.com/?id.295084" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32643", "reference_id": "show_bug.cgi?id=32643", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32643" }, { "reference_url": "https://vuldb.com/?submit.495402", "reference_id": "?submit.495402", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://vuldb.com/?submit.495402" }, { "reference_url": "https://usn.ubuntu.com/7423-1/", "reference_id": "USN-7423-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1181" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5t-65by-syac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72018?format=api", "vulnerability_id": "VCID-ftkb-qtse-afhq", "summary": "binutils: nm: potential segmentation fault when displaying symbols without version info", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-57360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04644", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04705", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04717", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04677", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05746", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-57360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339263", "reference_id": "2339263", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339263" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32467", "reference_id": "show_bug.cgi?id=32467", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T15:50:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32467" }, { "reference_url": "https://usn.ubuntu.com/7306-1/", "reference_id": "USN-7306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7306-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2024-57360" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftkb-qtse-afhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39614?format=api", "vulnerability_id": "VCID-fx6h-7q2k-5fd2", "summary": "Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1972", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15976", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15861", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15775", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17506", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17558", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17605", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19194", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185646", "reference_id": "2185646", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185646" }, { "reference_url": "https://security.gentoo.org/glsa/202309-15", "reference_id": "GLSA-202309-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/" } ], "url": "https://security.gentoo.org/glsa/202309-15" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=30285", "reference_id": "show_bug.cgi?id=30285", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=30285" }, { "reference_url": "https://usn.ubuntu.com/6101-1/", "reference_id": "USN-6101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6101-1/" }, { "reference_url": "https://usn.ubuntu.com/6842-1/", "reference_id": "USN-6842-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6842-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2023-1972" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fx6h-7q2k-5fd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66932?format=api", "vulnerability_id": "VCID-hd32-zxxu-6bh4", "summary": "binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11413", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06709", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06708", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402423", "reference_id": "2402423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402423" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16362", "reference_id": "attachment.cgi?id=16362", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.327349", "reference_id": "?ctiid.327349", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://vuldb.com/?ctiid.327349" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0" }, { "reference_url": "https://vuldb.com/?id.327349", "reference_id": "?id.327349", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://vuldb.com/?id.327349" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452", "reference_id": "show_bug.cgi?id=33452", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33452" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10", "reference_id": "show_bug.cgi?id=33456#c10", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10" }, { "reference_url": "https://vuldb.com/?submit.665587", "reference_id": "?submit.665587", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://vuldb.com/?submit.665587" }, { "reference_url": "https://vuldb.com/?submit.665590", "reference_id": "?submit.665590", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://vuldb.com/?submit.665590" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11413" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hd32-zxxu-6bh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69493?format=api", "vulnerability_id": "VCID-j49e-hexk-7kgd", "summary": "binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23891", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23948", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23992", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23975", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23862", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2408", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368763", "reference_id": "2368763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368763" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16010", "reference_id": "attachment.cgi?id=16010", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16010" }, { "reference_url": "https://vuldb.com/?ctiid.310346", "reference_id": "?ctiid.310346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://vuldb.com/?ctiid.310346" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5" }, { "reference_url": "https://vuldb.com/?id.310346", "reference_id": "?id.310346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://vuldb.com/?id.310346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20155", "reference_id": "RHSA-2025:20155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20155" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32858", "reference_id": "show_bug.cgi?id=32858", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32858" }, { "reference_url": "https://vuldb.com/?submit.584634", "reference_id": "?submit.584634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://vuldb.com/?submit.584634" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-5244" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j49e-hexk-7kgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71940?format=api", "vulnerability_id": "VCID-jm7b-4gnb-uygv", "summary": "binutils: GNU Binutils objdump.c disassemble_bytes stack-based overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27769", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342875", "reference_id": "2342875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342875" }, { "reference_url": "https://usn.ubuntu.com/7306-1/", "reference_id": "USN-7306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7306-1/" }, { "reference_url": "https://usn.ubuntu.com/7423-2/", "reference_id": "USN-7423-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-2/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2025-0840" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7b-4gnb-uygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66868?format=api", "vulnerability_id": "VCID-k6ey-kdwp-17ed", "summary": "binutils: GNU Binutils prdbg.c tg_tag_type return value", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04191", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04213", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04261", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04245", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404439", "reference_id": "2404439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404439" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16344", "reference_id": "attachment.cgi?id=16344", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16344" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.328774", "reference_id": "?ctiid.328774", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://vuldb.com/?ctiid.328774" }, { "reference_url": "https://vuldb.com/?id.328774", "reference_id": "?id.328774", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://vuldb.com/?id.328774" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33448", "reference_id": "show_bug.cgi?id=33448", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33448" }, { "reference_url": "https://vuldb.com/?submit.661279", "reference_id": "?submit.661279", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://vuldb.com/?submit.661279" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11839" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ey-kdwp-17ed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66931?format=api", "vulnerability_id": "VCID-kh2b-vdkt-nkep", "summary": "binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0721", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402424", "reference_id": "2402424", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402424" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16361", "reference_id": "attachment.cgi?id=16361", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16361" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.327350", "reference_id": "?ctiid.327350", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://vuldb.com/?ctiid.327350" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703" }, { "reference_url": "https://vuldb.com/?id.327350", "reference_id": "?id.327350", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://vuldb.com/?id.327350" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33450", "reference_id": "show_bug.cgi?id=33450", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33450" }, { "reference_url": "https://vuldb.com/?submit.665591", "reference_id": "?submit.665591", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://vuldb.com/?submit.665591" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11414" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kh2b-vdkt-nkep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68663?format=api", "vulnerability_id": "VCID-pejn-n3rz-33bs", "summary": "binutils: Binutils: Out-of-bounds Write Vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06443", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06453", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379793", "reference_id": "2379793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379793" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16118", "reference_id": "attachment.cgi?id=16118", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16118" }, { "reference_url": "https://vuldb.com/?ctiid.316244", "reference_id": "?ctiid.316244", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://vuldb.com/?ctiid.316244" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b" }, { "reference_url": "https://vuldb.com/?id.316244", "reference_id": "?id.316244", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://vuldb.com/?id.316244" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33050", "reference_id": "show_bug.cgi?id=33050", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33050" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2", "reference_id": "show_bug.cgi?id=33050#c2", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2" }, { "reference_url": "https://vuldb.com/?submit.614375", "reference_id": "?submit.614375", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://vuldb.com/?submit.614375" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-7546" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pejn-n3rz-33bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71889?format=api", "vulnerability_id": "VCID-pjtw-r398-uqgw", "summary": "binutils: GNU Binutils format.c bfd_set_format memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25184", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24956", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25144", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344743", "reference_id": "2344743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344743" }, { "reference_url": "https://vuldb.com/?ctiid.295057", "reference_id": "?ctiid.295057", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://vuldb.com/?ctiid.295057" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150" }, { "reference_url": "https://vuldb.com/?id.295057", "reference_id": "?id.295057", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://vuldb.com/?id.295057" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32603", "reference_id": "show_bug.cgi?id=32603", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32603" }, { "reference_url": "https://vuldb.com/?submit.489991", "reference_id": "?submit.489991", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://vuldb.com/?submit.489991" }, { "reference_url": "https://usn.ubuntu.com/7423-1/", "reference_id": "USN-7423-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-1/" }, { "reference_url": "https://usn.ubuntu.com/7423-2/", "reference_id": "USN-7423-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-2/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1153" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pjtw-r398-uqgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71880?format=api", "vulnerability_id": "VCID-sdx4-5wtj-hbf9", "summary": "binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2846", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28443", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28492", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28425", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30279", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344844", "reference_id": "2344844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344844" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15915", "reference_id": "attachment.cgi?id=15915", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15915" }, { "reference_url": "https://vuldb.com/?ctiid.295082", "reference_id": "?ctiid.295082", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://vuldb.com/?ctiid.295082" }, { "reference_url": "https://vuldb.com/?id.295082", "reference_id": "?id.295082", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://vuldb.com/?id.295082" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640", "reference_id": "show_bug.cgi?id=32640", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1", "reference_id": "show_bug.cgi?id=32640#c1", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1" }, { "reference_url": "https://vuldb.com/?submit.495376", "reference_id": "?submit.495376", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://vuldb.com/?submit.495376" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2025-1179" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sdx4-5wtj-hbf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71897?format=api", "vulnerability_id": "VCID-syyt-ureu-23h8", "summary": "binutils: GNU Binutils nm nm.c internal_strlen buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20717", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20726", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20821", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20742", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344647", "reference_id": "2344647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344647" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15881", "reference_id": "attachment.cgi?id=15881", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15881" }, { "reference_url": "https://vuldb.com/?ctiid.295051", "reference_id": "?ctiid.295051", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://vuldb.com/?ctiid.295051" }, { "reference_url": "https://vuldb.com/?id.295051", "reference_id": "?id.295051", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://vuldb.com/?id.295051" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32556", "reference_id": "show_bug.cgi?id=32556", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32556" }, { "reference_url": "https://vuldb.com/?submit.485254", "reference_id": "?submit.485254", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://vuldb.com/?submit.485254" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1147" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syyt-ureu-23h8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71882?format=api", "vulnerability_id": "VCID-t9qr-esv2-g7he", "summary": "binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1176", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43859", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43892", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43847", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4388", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43808", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47481", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47501", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986", "reference_id": "1108986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344833", "reference_id": "2344833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344833" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15913", "reference_id": "attachment.cgi?id=15913", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15913" }, { "reference_url": "https://vuldb.com/?ctiid.295079", "reference_id": "?ctiid.295079", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://vuldb.com/?ctiid.295079" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814" }, { "reference_url": "https://vuldb.com/?id.295079", "reference_id": "?id.295079", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://vuldb.com/?id.295079" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32636", "reference_id": "show_bug.cgi?id=32636", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32636" }, { "reference_url": "https://vuldb.com/?submit.495329", "reference_id": "?submit.495329", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://vuldb.com/?submit.495329" }, { "reference_url": "https://usn.ubuntu.com/7423-1/", "reference_id": "USN-7423-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-1/" }, { "reference_url": "https://usn.ubuntu.com/7423-2/", "reference_id": "USN-7423-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7423-2/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1176" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9qr-esv2-g7he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67404?format=api", "vulnerability_id": "VCID-tmj2-8abu-fuen", "summary": "binutils: GNU Binutils Linker heap-based overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11082", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05516", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.055", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11082" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399943", "reference_id": "2399943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2399943" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16358", "reference_id": "attachment.cgi?id=16358", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16358" }, { "reference_url": "https://vuldb.com/?ctiid.326123", "reference_id": "?ctiid.326123", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://vuldb.com/?ctiid.326123" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8" }, { "reference_url": "https://vuldb.com/?id.326123", "reference_id": "?id.326123", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://vuldb.com/?id.326123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23306", "reference_id": "RHSA-2025:23306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23405", "reference_id": "RHSA-2025:23405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23405" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33464", "reference_id": "show_bug.cgi?id=33464", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33464" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2", "reference_id": "show_bug.cgi?id=33464#c2", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2" }, { "reference_url": "https://vuldb.com/?submit.661276", "reference_id": "?submit.661276", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://vuldb.com/?submit.661276" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7919-1/", "reference_id": "USN-7919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7919-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11082" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmj2-8abu-fuen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71896?format=api", "vulnerability_id": "VCID-vcgu-7pzk-2udx", "summary": "binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1148", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21905", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21946", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22038", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21934", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21803", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344652", "reference_id": "2344652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344652" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", "reference_id": "attachment.cgi?id=15887", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887" }, { "reference_url": "https://vuldb.com/?ctiid.295052", "reference_id": "?ctiid.295052", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://vuldb.com/?ctiid.295052" }, { "reference_url": "https://vuldb.com/?id.295052", "reference_id": "?id.295052", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://vuldb.com/?id.295052" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", "reference_id": "show_bug.cgi?id=32576", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576" }, { "reference_url": "https://vuldb.com/?submit.485747", "reference_id": "?submit.485747", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://vuldb.com/?submit.485747" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1148" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcgu-7pzk-2udx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72625?format=api", "vulnerability_id": "VCID-vjrz-ss5c-skcc", "summary": "binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-53589", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39638", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39652", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39661", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39609", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39584", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-53589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330669", "reference_id": "2330669", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330669" }, { "reference_url": "https://www.gnu.org/software/binutils/", "reference_id": "binutils", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/" } ], "url": "https://www.gnu.org/software/binutils/" }, { "reference_url": "https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/", "reference_id": "binutils-objdump-tekhex-buffer-overflow", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/" } ], "url": "https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" } ], "aliases": [ "CVE-2024-53589" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjrz-ss5c-skcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66867?format=api", "vulnerability_id": "VCID-vwk2-2pwb-muhu", "summary": "binutils: GNU Binutils out-of-bounds read", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07986", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08035", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08055", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08071", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07991", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08032", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404481", "reference_id": "2404481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404481" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16351", "reference_id": "attachment.cgi?id=16351", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16351" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16357", "reference_id": "attachment.cgi?id=16357", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16357" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://vuldb.com/?ctiid.328775", "reference_id": "?ctiid.328775", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://vuldb.com/?ctiid.328775" }, { "reference_url": "https://vuldb.com/?id.328775", "reference_id": "?id.328775", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://vuldb.com/?id.328775" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33455", "reference_id": "show_bug.cgi?id=33455", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33455" }, { "reference_url": "https://vuldb.com/?submit.661281", "reference_id": "?submit.661281", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://vuldb.com/?submit.661281" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-11840" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwk2-2pwb-muhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71879?format=api", "vulnerability_id": "VCID-wj3y-5jmt-7ugw", "summary": "binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24108", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2397", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24015", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24146", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24041", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23994", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986", "reference_id": "1108986", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344846", "reference_id": "2344846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344846" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15917", "reference_id": "attachment.cgi?id=15917", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15917" }, { "reference_url": "https://vuldb.com/?ctiid.295083", "reference_id": "?ctiid.295083", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://vuldb.com/?ctiid.295083" }, { "reference_url": "https://vuldb.com/?id.295083", "reference_id": "?id.295083", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://vuldb.com/?id.295083" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32642", "reference_id": "show_bug.cgi?id=32642", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32642" }, { "reference_url": "https://vuldb.com/?submit.495381", "reference_id": "?submit.495381", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://vuldb.com/?submit.495381" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1180" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3y-5jmt-7ugw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70462?format=api", "vulnerability_id": "VCID-x3kv-wwqy-8bav", "summary": "binutils: GNU Binutils objdump bucomm.c display_info memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-3198", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21148", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20965", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21056", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20915", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21202", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-3198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357358", "reference_id": "2357358", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357358" }, { "reference_url": "https://vuldb.com/?ctiid.303151", "reference_id": "?ctiid.303151", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://vuldb.com/?ctiid.303151" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d" }, { "reference_url": "https://vuldb.com/?id.303151", "reference_id": "?id.303151", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://vuldb.com/?id.303151" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716", "reference_id": "show_bug.cgi?id=32716", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0", "reference_id": "show_bug.cgi?id=32716#c0", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0" }, { "reference_url": "https://vuldb.com/?submit.545773", "reference_id": "?submit.545773", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://vuldb.com/?submit.545773" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "1.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-3198" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x3kv-wwqy-8bav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71891?format=api", "vulnerability_id": "VCID-y2a1-fczv-k7e2", "summary": "binutils: GNU Binutils ld xmemdup.c xmemdup memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1151", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23262", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23218", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23178", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23052", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344713", "reference_id": "2344713", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344713" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", "reference_id": "attachment.cgi?id=15887", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887" }, { "reference_url": "https://vuldb.com/?ctiid.295055", "reference_id": "?ctiid.295055", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/" } ], "url": "https://vuldb.com/?ctiid.295055" }, { "reference_url": "https://vuldb.com/?id.295055", "reference_id": "?id.295055", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/" } ], "url": "https://vuldb.com/?id.295055" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", "reference_id": "show_bug.cgi?id=32576", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1151" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2a1-fczv-k7e2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68664?format=api", "vulnerability_id": "VCID-ycgk-1xz6-h3fm", "summary": "binutils: Binutils: Heap Buffer Overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7545", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06193", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07196", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07111", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07174", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07183", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379785", "reference_id": "2379785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379785" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=16117", "reference_id": "attachment.cgi?id=16117", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=16117" }, { "reference_url": "https://vuldb.com/?ctiid.316243", "reference_id": "?ctiid.316243", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://vuldb.com/?ctiid.316243" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944" }, { "reference_url": "https://vuldb.com/?id.316243", "reference_id": "?id.316243", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://vuldb.com/?id.316243" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33049", "reference_id": "show_bug.cgi?id=33049", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33049" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1", "reference_id": "show_bug.cgi?id=33049#c1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1" }, { "reference_url": "https://vuldb.com/?submit.614355", "reference_id": "?submit.614355", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://vuldb.com/?submit.614355" }, { "reference_url": "https://usn.ubuntu.com/7718-1/", "reference_id": "USN-7718-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7718-1/" }, { "reference_url": "https://usn.ubuntu.com/7847-1/", "reference_id": "USN-7847-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7847-1/" }, { "reference_url": "https://usn.ubuntu.com/7899-1/", "reference_id": "USN-7899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7899-1/" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C" }, { "value": "4.8", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-7545" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycgk-1xz6-h3fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71895?format=api", "vulnerability_id": "VCID-z1d7-yjdv-hyh8", "summary": "binutils: GNU Binutils ld xmalloc.c xstrdup memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1149", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14947", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15838", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15704", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15848", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344651", "reference_id": "2344651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344651" }, { "reference_url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887", "reference_id": "attachment.cgi?id=15887", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/" } ], "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887" }, { "reference_url": "https://vuldb.com/?ctiid.295053", "reference_id": "?ctiid.295053", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/" } ], "url": "https://vuldb.com/?ctiid.295053" }, { "reference_url": "https://vuldb.com/?id.295053", "reference_id": "?id.295053", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/" } ], "url": "https://vuldb.com/?id.295053" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576", "reference_id": "show_bug.cgi?id=32576", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576" }, { "reference_url": "https://www.gnu.org/", "reference_id": "www.gnu.org", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/" } ], "url": "https://www.gnu.org/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582405?format=api", "purl": "pkg:deb/debian/binutils@2.43.1-5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5" }, { "url": "http://public2.vulnerablecode.io/api/packages/582407?format=api", "purl": "pkg:deb/debian/binutils@2.45.50.20251125-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1" } ], "aliases": [ "CVE-2025-1149" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1d7-yjdv-hyh8" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78829?format=api", "vulnerability_id": "VCID-2sxq-338y-zudp", "summary": "binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03536", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03635", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03614", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234013", "reference_id": "2234013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234013" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29876", "reference_id": "show_bug.cgi?id=29876", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:09:56Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29876" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47673" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sxq-338y-zudp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78825?format=api", "vulnerability_id": "VCID-3abw-ksjw-hkff", "summary": "binutils: Field `file_table` of `struct module *module` is uninitialized", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05783", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05758", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05796", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05833", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05823", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05817", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167498", "reference_id": "2167498", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167498" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-25585", "reference_id": "CVE-2023-25585", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-25585" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231103-0003/", "reference_id": "ntap-20231103-0003", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231103-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29892", "reference_id": "show_bug.cgi?id=29892", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29892" }, { "reference_url": "https://usn.ubuntu.com/6101-1/", "reference_id": "USN-6101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6101-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2023-25585" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3abw-ksjw-hkff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78955?format=api", "vulnerability_id": "VCID-3j3x-b5s8-p7c1", "summary": "binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05112", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05196", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05213", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05183", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234027", "reference_id": "2234027", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234027" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29846", "reference_id": "show_bug.cgi?id=29846", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:31:16Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29846" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" }, { "reference_url": "https://usn.ubuntu.com/6655-1/", "reference_id": "USN-6655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6655-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47695" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3j3x-b5s8-p7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47230?format=api", "vulnerability_id": "VCID-4uea-bxbr-2kdz", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57639", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.5777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.5775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57724", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57719", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00354", "scoring_system": "epss", "scoring_elements": "0.57791", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956423", "reference_id": "1956423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956423" }, { "reference_url": "https://security.archlinux.org/AVG-1540", "reference_id": "AVG-1540", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1540" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-30" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-3530" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4uea-bxbr-2kdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79335?format=api", "vulnerability_id": "VCID-5cqh-f862-zugq", "summary": "binutils: memory leak in parse_stab_struct_fields() in stabs.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47011", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00862", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00851", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0085", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00869", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00867", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233992", "reference_id": "2233992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233992" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29261", "reference_id": "show_bug.cgi?id=29261", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:12:35Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29261" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47011" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cqh-f862-zugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78827?format=api", "vulnerability_id": "VCID-5rak-8wp8-hqcm", "summary": "binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05294", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05326", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05382", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05405", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05362", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05354", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167505", "reference_id": "2167505", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167505" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-25588", "reference_id": "CVE-2023-25588", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-25588" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231103-0003/", "reference_id": "ntap-20231103-0003", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231103-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29677", "reference_id": "show_bug.cgi?id=29677", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29677" }, { "reference_url": "https://usn.ubuntu.com/6101-1/", "reference_id": "USN-6101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6101-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2023-25588" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rak-8wp8-hqcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47235?format=api", "vulnerability_id": "VCID-66e8-kf7g-2bcv", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45078", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36696", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36851", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36769", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36785", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.3676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36779", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033715", "reference_id": "2033715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033715" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-30" }, { "reference_url": "https://usn.ubuntu.com/5341-1/", "reference_id": "USN-5341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5341-1/" }, { "reference_url": "https://usn.ubuntu.com/6160-1/", "reference_id": "USN-6160-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6160-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-45078" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66e8-kf7g-2bcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80025?format=api", "vulnerability_id": "VCID-6cjq-sz9f-mqf9", "summary": "libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.6809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.6816", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00556", "scoring_system": "epss", "scoring_elements": "0.68192", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122627", "reference_id": "2122627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3269", "reference_id": "RHSA-2023:3269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6372", "reference_id": "RHSA-2023:6372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6372" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-3826" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cjq-sz9f-mqf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49739?format=api", "vulnerability_id": "VCID-7sc8-fzw3-vfer", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35448", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32762", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55699", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55678", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55634", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55697", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950478", "reference_id": "1950478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950478" }, { "reference_url": "https://security.archlinux.org/AVG-1385", "reference_id": "AVG-1385", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1385" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4364", "reference_id": "RHSA-2021:4364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4364" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2020-35448" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78793?format=api", "vulnerability_id": "VCID-9v6f-mzak-87d6", "summary": "binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48064", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00878", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233958", "reference_id": "2233958", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233958" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/", "reference_id": "3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/", "reference_id": "KGSKF4GH7425S6XFDQMWTJGD5U47BAZN", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/", "reference_id": "NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0008/", "reference_id": "ntap-20231006-0008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0008/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29922", "reference_id": "show_bug.cgi?id=29922", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29922" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-48064" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9v6f-mzak-87d6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79321?format=api", "vulnerability_id": "VCID-bmef-m4dw-kbeu", "summary": "binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07204", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07226", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233975", "reference_id": "2233975", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233975" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29290", "reference_id": "show_bug.cgi?id=29290", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:32:59Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29290" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-35206" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bmef-m4dw-kbeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80626?format=api", "vulnerability_id": "VCID-by8y-uamt-f7bt", "summary": "gcc: uncontrolled recursion in libiberty/rust-demangle.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46195", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2241", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22465", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46047", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.45995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46051", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.45975", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50649", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046300", "reference_id": "2046300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8415", "reference_id": "RHSA-2022:8415", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8415" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-46195" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-by8y-uamt-f7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79836?format=api", "vulnerability_id": "VCID-cjbb-xm4r-c3b5", "summary": "binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10874", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10917", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1107", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11074", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11043", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234003", "reference_id": "2234003", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234003" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28753", "reference_id": "show_bug.cgi?id=28753", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:53:41Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28753" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" }, { "reference_url": "https://usn.ubuntu.com/6544-1/", "reference_id": "USN-6544-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6544-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-46174" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cjbb-xm4r-c3b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78790?format=api", "vulnerability_id": "VCID-cxp6-cmpk-7uff", "summary": "binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48063", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.0297", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03001", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03006", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03031", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02995", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48063" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233949", "reference_id": "2233949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233949" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0008/", "reference_id": "ntap-20231006-0008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0008/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29924", "reference_id": "show_bug.cgi?id=29924", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29924" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6655-1/", "reference_id": "USN-6655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6655-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-48063" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cxp6-cmpk-7uff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79334?format=api", "vulnerability_id": "VCID-e8f4-9g99-6yet", "summary": "binutils: memory leak in pr_function_type() in prdbg.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02603", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02587", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47010" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233988", "reference_id": "2233988", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233988" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29262", "reference_id": "show_bug.cgi?id=29262", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:31:53Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29262" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47010" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8f4-9g99-6yet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78824?format=api", "vulnerability_id": "VCID-f47d-fm3y-q3b9", "summary": "binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02585", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02578", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167467", "reference_id": "2167467", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167467" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-25584", "reference_id": "CVE-2023-25584", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-25584" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231103-0002/", "reference_id": "ntap-20231103-0002", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231103-0002/" }, { "reference_url": "https://usn.ubuntu.com/6101-1/", "reference_id": "USN-6101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6101-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2023-25584" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f47d-fm3y-q3b9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47233?format=api", "vulnerability_id": "VCID-hsyc-q23j-2ua3", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20284", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25792", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25875", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20284" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937784", "reference_id": "1937784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937784" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4364", "reference_id": "RHSA-2021:4364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4364" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-20284" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsyc-q23j-2ua3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78867?format=api", "vulnerability_id": "VCID-k4nr-2da1-jke3", "summary": "binutils: heap-based buffer overflow in display_debug_section() in readelf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06565", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06654", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06646", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234012", "reference_id": "2234012", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234012" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0003/", "reference_id": "ntap-20231006-0003", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29799", "reference_id": "show_bug.cgi?id=29799", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29799" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-45703" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4nr-2da1-jke3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78791?format=api", "vulnerability_id": "VCID-kvn8-qddz-vqag", "summary": "binutils: memory leak in find_abstract_instance() in dwarf2.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48065", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05135", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05221", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05204", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05234", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233963", "reference_id": "2233963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233963" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/", "reference_id": "GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/", "reference_id": "KGSKF4GH7425S6XFDQMWTJGD5U47BAZN", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0008/", "reference_id": "ntap-20231006-0008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0008/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29925", "reference_id": "show_bug.cgi?id=29925", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29925" }, { "reference_url": "https://usn.ubuntu.com/6655-1/", "reference_id": "USN-6655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6655-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-48065" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvn8-qddz-vqag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79320?format=api", "vulnerability_id": "VCID-mtb5-2vq5-4yf7", "summary": "binutils: reachable assertion in display_debug_names() in dwarf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05299", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233969", "reference_id": "2233969", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233969" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0010/", "reference_id": "ntap-20231006-0010", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0010/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29289", "reference_id": "show_bug.cgi?id=29289", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29289" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6544-1/", "reference_id": "USN-6544-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6544-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-35205" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtb5-2vq5-4yf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78284?format=api", "vulnerability_id": "VCID-pkej-frsd-gqdk", "summary": "binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.27011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26868", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.27048", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26953", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233934", "reference_id": "2233934", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233934" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26240", "reference_id": "show_bug.cgi?id=26240", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26240" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26241", "reference_id": "show_bug.cgi?id=26241", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26241" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" }, { "reference_url": "https://usn.ubuntu.com/6544-1/", "reference_id": "USN-6544-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6544-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2020-19726" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkej-frsd-gqdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39613?format=api", "vulnerability_id": "VCID-q1nv-rtqz-4fhk", "summary": "Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1579", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14762", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16505", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16638", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16628", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16569", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1579" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180905", "reference_id": "2180905", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180905" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8" }, { "reference_url": "https://security.gentoo.org/glsa/202309-15", "reference_id": "GLSA-202309-15", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/" } ], "url": "https://security.gentoo.org/glsa/202309-15" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230511-0009/", "reference_id": "ntap-20230511-0009", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230511-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2353", "reference_id": "RHSA-2024:2353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2353" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29988", "reference_id": "show_bug.cgi?id=29988", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29988" }, { "reference_url": "https://usn.ubuntu.com/6101-1/", "reference_id": "USN-6101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6101-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2023-1579" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q1nv-rtqz-4fhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78826?format=api", "vulnerability_id": "VCID-r1u7-ujc5-g7aw", "summary": "binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09206", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09177", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09163", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167502", "reference_id": "2167502", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167502" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-25586", "reference_id": "CVE-2023-25586", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-25586" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502", "reference_id": "gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231103-0003/", "reference_id": "ntap-20231103-0003", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231103-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29855", "reference_id": "show_bug.cgi?id=29855", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29855" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2023-25586" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1u7-ujc5-g7aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39612?format=api", "vulnerability_id": "VCID-rcs3-znj9-pbb8", "summary": "Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08367", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08342", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08421", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08387", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08279", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124569", "reference_id": "2124569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124569" }, { "reference_url": "https://security.gentoo.org/glsa/202309-15", "reference_id": "GLSA-202309-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202309-15" }, { "reference_url": "https://usn.ubuntu.com/5762-1/", "reference_id": "USN-5762-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5762-1/" }, { "reference_url": "https://usn.ubuntu.com/6544-1/", "reference_id": "USN-6544-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6544-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-38533" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcs3-znj9-pbb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78896?format=api", "vulnerability_id": "VCID-rcxk-qvqu-y3fj", "summary": "binutils: heap-based buffer overflow in find_section_in_set() in readelf.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06597", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06703", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234004", "reference_id": "2234004", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234004" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29732", "reference_id": "show_bug.cgi?id=29732", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:15:25Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29732" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-44840" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcxk-qvqu-y3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79337?format=api", "vulnerability_id": "VCID-tcc9-936c-vkhk", "summary": "binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47008", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02575", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02603", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02587", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233984", "reference_id": "2233984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233984" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20", "reference_id": "show_bug.cgi?id=29255%20", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:13:36Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47008" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcc9-936c-vkhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82342?format=api", "vulnerability_id": "VCID-ugns-tvmf-e7c7", "summary": "binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3455", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735604", "reference_id": "1735604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1797", "reference_id": "RHSA-2020:1797", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1797" }, { "reference_url": "https://usn.ubuntu.com/5349-1/", "reference_id": "USN-5349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2019-1010204" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ugns-tvmf-e7c7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39607?format=api", "vulnerability_id": "VCID-uqym-35ay-uua8", "summary": "Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4285", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17674", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17762", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17824", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1784", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17748", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150768", "reference_id": "2150768", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150768" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70" }, { "reference_url": "https://security.gentoo.org/glsa/202309-15", "reference_id": "GLSA-202309-15", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/" } ], "url": "https://security.gentoo.org/glsa/202309-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2873", "reference_id": "RHSA-2023:2873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3269", "reference_id": "RHSA-2023:3269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6236", "reference_id": "RHSA-2023:6236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6593", "reference_id": "RHSA-2023:6593", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6593" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7394", "reference_id": "RHSA-2023:7394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7394" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29699", "reference_id": "show_bug.cgi?id=29699", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29699" }, { "reference_url": "https://usn.ubuntu.com/6544-1/", "reference_id": "USN-6544-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6544-1/" }, { "reference_url": "https://usn.ubuntu.com/6842-1/", "reference_id": "USN-6842-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6842-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-4285" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqym-35ay-uua8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47231?format=api", "vulnerability_id": "VCID-uv5p-15z7-fqcn", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.5717", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57182", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57161", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00346", "scoring_system": "epss", "scoring_elements": "0.57141", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960717", "reference_id": "1960717", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960717" }, { "reference_url": "https://security.archlinux.org/AVG-2002", "reference_id": "AVG-2002", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2002" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-30" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-3549" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uv5p-15z7-fqcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79336?format=api", "vulnerability_id": "VCID-vj46-k8jn-a7ew", "summary": "binutils: memory leak in stab_demangle_v3_arg() in stabs.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47007", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00862", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00851", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0085", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00869", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00867", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233980", "reference_id": "2233980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233980" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29254", "reference_id": "show_bug.cgi?id=29254", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:14:11Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29254" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" }, { "reference_url": "https://usn.ubuntu.com/6581-1/", "reference_id": "USN-6581-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6581-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47007" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vj46-k8jn-a7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78844?format=api", "vulnerability_id": "VCID-xdh7-9hu5-vfa6", "summary": "binutils: segmentation fault in compare_symbols() in objdump.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03536", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03635", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03614", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234029", "reference_id": "2234029", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234029" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29677", "reference_id": "show_bug.cgi?id=29677", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:26:58Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29677" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2022-47696" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xdh7-9hu5-vfa6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47232?format=api", "vulnerability_id": "VCID-znqk-35mz-dqfk", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30284", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.302", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30313", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30177", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30186", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743", "reference_id": "1913743", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913743" }, { "reference_url": "https://security.archlinux.org/AVG-1540", "reference_id": "AVG-1540", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1540" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/" } ], "url": "https://security.gentoo.org/glsa/202208-30" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210528-0009/", "reference_id": "ntap-20210528-0009", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210528-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4364", "reference_id": "RHSA-2021:4364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4364" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945", "reference_id": "show_bug.cgi?id=26945", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26945" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582404?format=api", "purl": "pkg:deb/debian/binutils@2.40-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" } ], "aliases": [ "CVE-2021-20197" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-znqk-35mz-dqfk" } ], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2" }