Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/grub2@2.12-6?distro=trixie
Typedeb
Namespacedebian
Namegrub2
Version2.12-6
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.14-1
Latest_non_vulnerable_version2.14-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1vtj-un1a-afax
vulnerability_id VCID-1vtj-un1a-afax
summary grub2: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0685.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0685.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0685
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18
published_at 2026-04-26T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18329
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18073
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18116
published_at 2026-04-21T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18023
published_at 2026-04-24T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18384
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18085
published_at 2026-04-18T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18169
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18223
published_at 2026-04-09T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18227
published_at 2026-04-11T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1818
published_at 2026-04-12T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0685
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0685
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346120
reference_id 2346120
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:13:24Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346120
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0685
reference_id CVE-2025-0685
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:13:24Z/
url https://access.redhat.com/security/cve/CVE-2025-0685
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0685
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vtj-un1a-afax
1
url VCID-3vhv-ya75-cuhc
vulnerability_id VCID-3vhv-ya75-cuhc
summary grub2: command/gpg: Use-after-free due to hooks not being removed on module unload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0622.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0622
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00286
published_at 2026-04-08T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00288
published_at 2026-04-07T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00299
published_at 2026-04-02T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.0028
published_at 2026-04-16T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00282
published_at 2026-04-13T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00283
published_at 2026-04-18T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00285
published_at 2026-04-11T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00297
published_at 2026-04-04T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.0063
published_at 2026-04-24T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00632
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0622
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345865
reference_id 2345865
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:41:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345865
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0622
reference_id CVE-2025-0622
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:41:48Z/
url https://access.redhat.com/security/cve/CVE-2025-0622
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:41:48Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
13
reference_url https://access.redhat.com/errata/RHSA-2025:16154
reference_id RHSA-2025:16154
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:41:48Z/
url https://access.redhat.com/errata/RHSA-2025:16154
14
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:41:48Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0622
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vhv-ya75-cuhc
2
url VCID-5a7e-ctj7-dqab
vulnerability_id VCID-5a7e-ctj7-dqab
summary grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0677.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0677
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07753
published_at 2026-04-07T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07813
published_at 2026-04-08T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07825
published_at 2026-04-11T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0783
published_at 2026-04-09T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07751
published_at 2026-04-02T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07688
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07712
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07798
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07812
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07795
published_at 2026-04-04T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.1002
published_at 2026-04-26T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.10062
published_at 2026-04-21T12:55:00Z
12
value 0.00034
scoring_system epss
scoring_elements 0.1004
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0677
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346116
reference_id 2346116
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:39:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346116
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0677
reference_id CVE-2025-0677
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:39:38Z/
url https://access.redhat.com/security/cve/CVE-2025-0677
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:39:38Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
13
reference_url https://access.redhat.com/errata/RHSA-2025:16154
reference_id RHSA-2025:16154
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:39:38Z/
url https://access.redhat.com/errata/RHSA-2025:16154
14
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:39:38Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0677
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5a7e-ctj7-dqab
3
url VCID-5m3u-p8q4-kfhx
vulnerability_id VCID-5m3u-p8q4-kfhx
summary grub2: commands/extcmd: Missing check for failed allocation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45775.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45775
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07839
published_at 2026-04-26T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07757
published_at 2026-04-18T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.0791
published_at 2026-04-21T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07871
published_at 2026-04-24T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07821
published_at 2026-04-02T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07868
published_at 2026-04-04T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07822
published_at 2026-04-07T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.0788
published_at 2026-04-08T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07905
published_at 2026-04-09T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07892
published_at 2026-04-11T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07879
published_at 2026-04-12T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07866
published_at 2026-04-13T12:55:00Z
12
value 0.00028
scoring_system epss
scoring_elements 0.07781
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45775
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2337481
reference_id 2337481
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2337481
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45775
reference_id CVE-2024-45775
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:30Z/
url https://access.redhat.com/security/cve/CVE-2024-45775
12
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:30Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45775
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5m3u-p8q4-kfhx
4
url VCID-5m6c-h4j2-mqcg
vulnerability_id VCID-5m6c-h4j2-mqcg
summary grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45777.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45777
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06424
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06236
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-21T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06195
published_at 2026-04-02T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-04T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06207
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06249
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.0629
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-11T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-12T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06266
published_at 2026-04-13T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06225
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346343
reference_id 2346343
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:38:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346343
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45777
reference_id CVE-2024-45777
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:38:37Z/
url https://access.redhat.com/security/cve/CVE-2024-45777
12
reference_url https://access.redhat.com/errata/RHSA-2025:20532
reference_id RHSA-2025:20532
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T18:38:37Z/
url https://access.redhat.com/errata/RHSA-2025:20532
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45777
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5m6c-h4j2-mqcg
5
url VCID-5vyx-ut4z-jucd
vulnerability_id VCID-5vyx-ut4z-jucd
summary grub2: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0689.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0689
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-26T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23088
published_at 2026-04-13T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23102
published_at 2026-04-16T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23094
published_at 2026-04-18T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23056
published_at 2026-04-21T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22887
published_at 2026-04-24T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23248
published_at 2026-04-04T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23038
published_at 2026-04-07T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23111
published_at 2026-04-08T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-09T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.23184
published_at 2026-04-11T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.23146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0689
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0689
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346122
reference_id 2346122
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:08:10Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346122
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0689
reference_id CVE-2025-0689
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:08:10Z/
url https://access.redhat.com/security/cve/CVE-2025-0689
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:08:10Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0689
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vyx-ut4z-jucd
6
url VCID-6cpn-v8j3-7ub3
vulnerability_id VCID-6cpn-v8j3-7ub3
summary grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45776.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45776
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06424
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06236
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-21T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06195
published_at 2026-04-02T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-04T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06207
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06249
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.0629
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-11T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-12T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06266
published_at 2026-04-13T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06225
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2339182
reference_id 2339182
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:26Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2339182
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45776
reference_id CVE-2024-45776
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:26Z/
url https://access.redhat.com/security/cve/CVE-2024-45776
12
reference_url https://access.redhat.com/errata/RHSA-2025:16154
reference_id RHSA-2025:16154
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:26Z/
url https://access.redhat.com/errata/RHSA-2025:16154
13
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:26Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45776
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cpn-v8j3-7ub3
7
url VCID-6tg5-6gjc-nygy
vulnerability_id VCID-6tg5-6gjc-nygy
summary grub2: read: Integer overflow may lead to out-of-bounds write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0690.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0690
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00488
published_at 2026-04-26T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00475
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00457
published_at 2026-04-12T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00456
published_at 2026-04-13T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00454
published_at 2026-04-16T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.0046
published_at 2026-04-18T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00491
published_at 2026-04-21T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00471
published_at 2026-04-04T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00467
published_at 2026-04-07T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00464
published_at 2026-04-08T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.00461
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0690
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346123
reference_id 2346123
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T11:17:51Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346123
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0690
reference_id CVE-2025-0690
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T11:17:51Z/
url https://access.redhat.com/security/cve/CVE-2025-0690
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T11:17:51Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
13
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-24T11:17:51Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0690
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tg5-6gjc-nygy
8
url VCID-6vxc-35x2-3fek
vulnerability_id VCID-6vxc-35x2-3fek
summary grub2: fs/bfs: Integer overflow in the BFS parser.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45778.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45778
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02263
published_at 2026-04-26T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02288
published_at 2026-04-21T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02271
published_at 2026-04-24T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04342
published_at 2026-04-16T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04351
published_at 2026-04-18T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04331
published_at 2026-04-02T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04352
published_at 2026-04-04T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04363
published_at 2026-04-07T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04395
published_at 2026-04-08T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04411
published_at 2026-04-09T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04406
published_at 2026-04-11T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04391
published_at 2026-04-12T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04375
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45778
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345640
reference_id 2345640
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T16:17:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345640
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45778
reference_id CVE-2024-45778
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T16:17:31Z/
url https://access.redhat.com/security/cve/CVE-2024-45778
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-04T16:17:31Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45778
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vxc-35x2-3fek
9
url VCID-dn64-5ysd-yfer
vulnerability_id VCID-dn64-5ysd-yfer
summary grub2: heap-based buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56737.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56737
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.3516
published_at 2026-04-26T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.3547
published_at 2026-04-18T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35418
published_at 2026-04-21T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35182
published_at 2026-04-24T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35518
published_at 2026-04-02T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35543
published_at 2026-04-04T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35425
published_at 2026-04-07T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-08T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35496
published_at 2026-04-09T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35506
published_at 2026-04-11T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35463
published_at 2026-04-12T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35441
published_at 2026-04-13T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35481
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56737
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2334772
reference_id 2334772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2334772
5
reference_url https://savannah.gnu.org/bugs/?66599
reference_id ?66599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-31T18:16:13Z/
url https://savannah.gnu.org/bugs/?66599
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-56737
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn64-5ysd-yfer
10
url VCID-h2ca-d9yc-vbex
vulnerability_id VCID-h2ca-d9yc-vbex
summary grub2: fs/hfs: Integer overflow may lead to heap based out-of-bounds write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1125.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1125
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19379
published_at 2026-04-26T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19709
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19511
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19484
published_at 2026-04-18T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19496
published_at 2026-04-21T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19388
published_at 2026-04-24T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19757
published_at 2026-04-04T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19561
published_at 2026-04-08T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19613
published_at 2026-04-09T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19617
published_at 2026-04-11T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19569
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1125
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346138
reference_id 2346138
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:11:35Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346138
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-1125
reference_id CVE-2025-1125
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:11:35Z/
url https://access.redhat.com/security/cve/CVE-2025-1125
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:11:35Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-1125
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ca-d9yc-vbex
11
url VCID-hn4b-sdcq-j3bx
vulnerability_id VCID-hn4b-sdcq-j3bx
summary grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1118.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1118
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03921
published_at 2026-04-12T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03938
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0397
published_at 2026-04-09T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03929
published_at 2026-04-04T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03947
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03941
published_at 2026-04-07T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.0392
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03881
published_at 2026-04-18T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03892
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-26T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0476
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1118
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1118
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346137
reference_id 2346137
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T17:23:06Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346137
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-1118
reference_id CVE-2025-1118
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T17:23:06Z/
url https://access.redhat.com/security/cve/CVE-2025-1118
12
reference_url https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f
reference_id ?id=34824806ac6302f91e8cabaa41308eaced25725f
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T17:23:06Z/
url https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f
13
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T17:23:06Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
14
reference_url https://access.redhat.com/errata/RHSA-2025:16154
reference_id RHSA-2025:16154
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T17:23:06Z/
url https://access.redhat.com/errata/RHSA-2025:16154
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-1118
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hn4b-sdcq-j3bx
12
url VCID-nphq-62t2-b7bk
vulnerability_id VCID-nphq-62t2-b7bk
summary grub2: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0684.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0684.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0684
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07121
published_at 2026-04-26T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.06999
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07016
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07148
published_at 2026-04-21T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07115
published_at 2026-04-24T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07052
published_at 2026-04-04T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07032
published_at 2026-04-07T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07086
published_at 2026-04-08T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07117
published_at 2026-04-09T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07116
published_at 2026-04-11T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07105
published_at 2026-04-12T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07095
published_at 2026-04-13T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07031
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0684
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0684
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346119
reference_id 2346119
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:14:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346119
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0684
reference_id CVE-2025-0684
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:14:33Z/
url https://access.redhat.com/security/cve/CVE-2025-0684
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0684
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nphq-62t2-b7bk
13
url VCID-pjq7-bxwk-uqec
vulnerability_id VCID-pjq7-bxwk-uqec
summary grub2: fs/hfs+: refcount can be decremented twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45783.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45783
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03787
published_at 2026-04-26T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03655
published_at 2026-04-18T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03777
published_at 2026-04-21T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03784
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03707
published_at 2026-04-02T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03718
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03732
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03735
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03758
published_at 2026-04-09T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03717
published_at 2026-04-11T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03694
published_at 2026-04-12T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03668
published_at 2026-04-13T12:55:00Z
12
value 0.00016
scoring_system epss
scoring_elements 0.03645
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45783
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45783
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345863
reference_id 2345863
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345863
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45783
reference_id CVE-2024-45783
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:27Z/
url https://access.redhat.com/security/cve/CVE-2024-45783
12
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T14:42:27Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45783
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjq7-bxwk-uqec
14
url VCID-s86w-7czc-s3a9
vulnerability_id VCID-s86w-7czc-s3a9
summary grub2: reader/jpeg: Heap OOB Write during JPEG parsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45774.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45774
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.0016
published_at 2026-04-26T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00156
published_at 2026-04-18T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00155
published_at 2026-04-13T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00154
published_at 2026-04-08T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00158
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45774
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45774
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2337461
reference_id 2337461
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T18:54:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2337461
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45774
reference_id CVE-2024-45774
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T18:54:05Z/
url https://access.redhat.com/security/cve/CVE-2024-45774
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T18:54:05Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
13
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T18:54:05Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45774
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s86w-7czc-s3a9
15
url VCID-sub1-vd8w-dka7
vulnerability_id VCID-sub1-vd8w-dka7
summary grub2: net: Out-of-bounds write in grub_net_search_config_file()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0624.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0624
reference_id
reference_type
scores
0
value 0.00793
scoring_system epss
scoring_elements 0.73893
published_at 2026-04-02T12:55:00Z
1
value 0.00793
scoring_system epss
scoring_elements 0.73936
published_at 2026-04-09T12:55:00Z
2
value 0.00793
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-11T12:55:00Z
3
value 0.00793
scoring_system epss
scoring_elements 0.7394
published_at 2026-04-12T12:55:00Z
4
value 0.00793
scoring_system epss
scoring_elements 0.73932
published_at 2026-04-13T12:55:00Z
5
value 0.00793
scoring_system epss
scoring_elements 0.73973
published_at 2026-04-16T12:55:00Z
6
value 0.00793
scoring_system epss
scoring_elements 0.73982
published_at 2026-04-18T12:55:00Z
7
value 0.00793
scoring_system epss
scoring_elements 0.73917
published_at 2026-04-04T12:55:00Z
8
value 0.00793
scoring_system epss
scoring_elements 0.73888
published_at 2026-04-07T12:55:00Z
9
value 0.00793
scoring_system epss
scoring_elements 0.73923
published_at 2026-04-08T12:55:00Z
10
value 0.00815
scoring_system epss
scoring_elements 0.74331
published_at 2026-04-21T12:55:00Z
11
value 0.00815
scoring_system epss
scoring_elements 0.74365
published_at 2026-04-24T12:55:00Z
12
value 0.00815
scoring_system epss
scoring_elements 0.74373
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346112
reference_id 2346112
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346112
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
reference_id cpe:/a:redhat:openshift:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8
reference_id cpe:/a:redhat:openshift:4.13::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8
reference_id cpe:/a:redhat:openshift:4.14::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8
reference_id cpe:/a:redhat:openshift:4.15::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
reference_id cpe:/a:redhat:openshift:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
reference_id cpe:/a:redhat:openshift:4.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.4::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
reference_id cpe:/o:redhat:rhel_tus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://access.redhat.com/security/cve/CVE-2025-0624
reference_id CVE-2025-0624
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/security/cve/CVE-2025-0624
33
reference_url https://access.redhat.com/errata/RHSA-2025:2521
reference_id RHSA-2025:2521
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2521
34
reference_url https://access.redhat.com/errata/RHSA-2025:2653
reference_id RHSA-2025:2653
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2653
35
reference_url https://access.redhat.com/errata/RHSA-2025:2655
reference_id RHSA-2025:2655
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2655
36
reference_url https://access.redhat.com/errata/RHSA-2025:2675
reference_id RHSA-2025:2675
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2675
37
reference_url https://access.redhat.com/errata/RHSA-2025:2784
reference_id RHSA-2025:2784
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2784
38
reference_url https://access.redhat.com/errata/RHSA-2025:2799
reference_id RHSA-2025:2799
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2799
39
reference_url https://access.redhat.com/errata/RHSA-2025:2867
reference_id RHSA-2025:2867
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2867
40
reference_url https://access.redhat.com/errata/RHSA-2025:2869
reference_id RHSA-2025:2869
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:2869
41
reference_url https://access.redhat.com/errata/RHSA-2025:3367
reference_id RHSA-2025:3367
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:3367
42
reference_url https://access.redhat.com/errata/RHSA-2025:3396
reference_id RHSA-2025:3396
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:3396
43
reference_url https://access.redhat.com/errata/RHSA-2025:3780
reference_id RHSA-2025:3780
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:3780
44
reference_url https://access.redhat.com/errata/RHSA-2025:4422
reference_id RHSA-2025:4422
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:4422
45
reference_url https://access.redhat.com/errata/RHSA-2025:7702
reference_id RHSA-2025:7702
reference_type
scores
0
value 7.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-19T03:55:15Z/
url https://access.redhat.com/errata/RHSA-2025:7702
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0624
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sub1-vd8w-dka7
16
url VCID-tkur-tbms-zkcz
vulnerability_id VCID-tkur-tbms-zkcz
summary grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0678.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0678
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07562
published_at 2026-04-26T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07511
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-18T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07638
published_at 2026-04-21T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07585
published_at 2026-04-24T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07551
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07592
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07612
published_at 2026-04-09T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0761
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07598
published_at 2026-04-12T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07584
published_at 2026-04-13T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0678
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346118
reference_id 2346118
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:15:54Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346118
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0678
reference_id CVE-2025-0678
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:15:54Z/
url https://access.redhat.com/security/cve/CVE-2025-0678
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0678
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkur-tbms-zkcz
17
url VCID-x57b-4ggt-5qdf
vulnerability_id VCID-x57b-4ggt-5qdf
summary grub2: fs/tar: Integer Overflow causes Heap OOB Write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45780.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45780
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06424
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06266
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06225
published_at 2026-04-16T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06236
published_at 2026-04-18T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-21T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-24T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06195
published_at 2026-04-02T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-04T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06207
published_at 2026-04-07T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06249
published_at 2026-04-08T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.0629
published_at 2026-04-09T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-11T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45780
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345856
reference_id 2345856
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:07:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345856
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45780
reference_id CVE-2024-45780
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:07:37Z/
url https://access.redhat.com/security/cve/CVE-2024-45780
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-03T15:07:37Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45780
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x57b-4ggt-5qdf
18
url VCID-xamt-2k26-p3ev
vulnerability_id VCID-xamt-2k26-p3ev
summary grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45782.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45782
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-26T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.0086
published_at 2026-04-18T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00909
published_at 2026-04-21T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00912
published_at 2026-04-24T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00866
published_at 2026-04-04T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00868
published_at 2026-04-07T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00872
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.0087
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-11T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-12T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00854
published_at 2026-04-13T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00853
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45782
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345858
reference_id 2345858
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:16:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345858
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45782
reference_id CVE-2024-45782
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:16:37Z/
url https://access.redhat.com/security/cve/CVE-2024-45782
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45782
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xamt-2k26-p3ev
19
url VCID-xjtf-q3gz-7ug8
vulnerability_id VCID-xjtf-q3gz-7ug8
summary grub2: fs/bfs: Integer overflow leads to Heap OOB Read in the BFS parser
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45779.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45779
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04079
published_at 2026-04-26T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-13T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03911
published_at 2026-04-16T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03923
published_at 2026-04-18T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04045
published_at 2026-04-21T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0406
published_at 2026-04-24T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03954
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03969
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03982
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03988
published_at 2026-04-08T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04006
published_at 2026-04-09T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.03976
published_at 2026-04-11T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.0396
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345854
reference_id 2345854
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T15:05:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345854
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45779
reference_id CVE-2024-45779
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T15:05:17Z/
url https://access.redhat.com/security/cve/CVE-2024-45779
12
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-03T15:05:17Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45779
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjtf-q3gz-7ug8
20
url VCID-ymw1-gk3r-kfhz
vulnerability_id VCID-ymw1-gk3r-kfhz
summary grub2: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading dat
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0686.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0686.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0686
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18
published_at 2026-04-26T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18329
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18073
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18116
published_at 2026-04-21T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18023
published_at 2026-04-24T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18384
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18085
published_at 2026-04-18T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18169
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18223
published_at 2026-04-09T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18227
published_at 2026-04-11T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1818
published_at 2026-04-12T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0686
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0686
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346121
reference_id 2346121
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:11:43Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2346121
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-0686
reference_id CVE-2025-0686
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T16:11:43Z/
url https://access.redhat.com/security/cve/CVE-2025-0686
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-0686
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymw1-gk3r-kfhz
21
url VCID-yw2r-4rr8-pkfd
vulnerability_id VCID-yw2r-4rr8-pkfd
summary grub2: fs/ufs: OOB write in the heap
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45781.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45781
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06424
published_at 2026-04-26T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06236
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-21T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06399
published_at 2026-04-24T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06195
published_at 2026-04-02T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-04T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06207
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06249
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.0629
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06281
published_at 2026-04-11T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06277
published_at 2026-04-12T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06266
published_at 2026-04-13T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06225
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
reference_id 1098319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345857
reference_id 2345857
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2345857
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
11
reference_url https://access.redhat.com/security/cve/CVE-2024-45781
reference_id CVE-2024-45781
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:23Z/
url https://access.redhat.com/security/cve/CVE-2024-45781
12
reference_url https://access.redhat.com/errata/RHSA-2025:16154
reference_id RHSA-2025:16154
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:23Z/
url https://access.redhat.com/errata/RHSA-2025:16154
13
reference_url https://access.redhat.com/errata/RHSA-2025:6990
reference_id RHSA-2025:6990
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T14:43:23Z/
url https://access.redhat.com/errata/RHSA-2025:6990
fixed_packages
0
url pkg:deb/debian/grub2@2.12-6?distro=trixie
purl pkg:deb/debian/grub2@2.12-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/grub2@2.12-9%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-swtj-9pmu-4ugn
5
vulnerability VCID-ur99-cm1x-cfdm
6
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-9%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
purl pkg:deb/debian/grub2@2.14~git20250718.0e36779-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tdk-6d8a-m7h8
1
vulnerability VCID-53x3-83by-gueq
2
vulnerability VCID-c2vg-36gb-bqas
3
vulnerability VCID-gaet-924c-57dv
4
vulnerability VCID-ur99-cm1x-cfdm
5
vulnerability VCID-wy3p-p9zf-r7ef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14~git20250718.0e36779-2%3Fdistro=trixie
3
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2024-45781
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw2r-4rr8-pkfd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.12-6%3Fdistro=trixie