Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/grub2@2.14-1?distro=trixie
Typedeb
Namespacedebian
Namegrub2
Version2.14-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.14-2
Latest_non_vulnerable_version2.14-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1tdk-6d8a-m7h8
vulnerability_id VCID-1tdk-6d8a-m7h8
summary grub2: Missing unregister call for gettext command may lead to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61662
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-26T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01495
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-11T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01506
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01664
published_at 2026-04-16T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01668
published_at 2026-04-18T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01757
published_at 2026-04-21T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01768
published_at 2026-04-24T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01492
published_at 2026-04-02T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.0151
published_at 2026-04-09T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01494
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414683
reference_id 2414683
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2414683
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
reference_id cpe:/a:redhat:openshift:4.19::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
27
reference_url https://access.redhat.com/security/cve/CVE-2025-61662
reference_id CVE-2025-61662
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/security/cve/CVE-2025-61662
28
reference_url https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
reference_id msg00155.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
29
reference_url https://access.redhat.com/errata/RHSA-2026:4648
reference_id RHSA-2026:4648
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4648
30
reference_url https://access.redhat.com/errata/RHSA-2026:4649
reference_id RHSA-2026:4649
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4649
31
reference_url https://access.redhat.com/errata/RHSA-2026:4652
reference_id RHSA-2026:4652
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4652
32
reference_url https://access.redhat.com/errata/RHSA-2026:4653
reference_id RHSA-2026:4653
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4653
33
reference_url https://access.redhat.com/errata/RHSA-2026:4654
reference_id RHSA-2026:4654
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4654
34
reference_url https://access.redhat.com/errata/RHSA-2026:4760
reference_id RHSA-2026:4760
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4760
35
reference_url https://access.redhat.com/errata/RHSA-2026:4822
reference_id RHSA-2026:4822
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4822
36
reference_url https://access.redhat.com/errata/RHSA-2026:4823
reference_id RHSA-2026:4823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4823
37
reference_url https://access.redhat.com/errata/RHSA-2026:4830
reference_id RHSA-2026:4830
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4830
38
reference_url https://access.redhat.com/errata/RHSA-2026:4900
reference_id RHSA-2026:4900
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4900
39
reference_url https://access.redhat.com/errata/RHSA-2026:4998
reference_id RHSA-2026:4998
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:4998
40
reference_url https://access.redhat.com/errata/RHSA-2026:5074
reference_id RHSA-2026:5074
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:5074
41
reference_url https://access.redhat.com/errata/RHSA-2026:5127
reference_id RHSA-2026:5127
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:5127
42
reference_url https://access.redhat.com/errata/RHSA-2026:5233
reference_id RHSA-2026:5233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:5233
43
reference_url https://access.redhat.com/errata/RHSA-2026:6492
reference_id RHSA-2026:6492
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:6492
44
reference_url https://access.redhat.com/errata/RHSA-2026:7239
reference_id RHSA-2026:7239
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:7239
45
reference_url https://access.redhat.com/errata/RHSA-2026:7243
reference_id RHSA-2026:7243
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/
url https://access.redhat.com/errata/RHSA-2026:7243
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-61662
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tdk-6d8a-m7h8
1
url VCID-53x3-83by-gueq
vulnerability_id VCID-53x3-83by-gueq
summary grub2: Use-after-free in grub_file_close()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54771.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-54771
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02605
published_at 2026-04-26T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02519
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02629
published_at 2026-04-21T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02617
published_at 2026-04-24T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02767
published_at 2026-04-16T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08378
published_at 2026-04-07T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-08T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08467
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08462
published_at 2026-04-11T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-12T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08427
published_at 2026-04-13T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08405
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-54771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413823
reference_id 2413823
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:17:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2413823
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-54771
reference_id CVE-2025-54771
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:17:17Z/
url https://access.redhat.com/security/cve/CVE-2025-54771
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-54771
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53x3-83by-gueq
2
url VCID-c2vg-36gb-bqas
vulnerability_id VCID-c2vg-36gb-bqas
summary grub2: Missing unregister call for normal_exit command may lead to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61664.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61664
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-26T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02997
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03118
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03115
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03326
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06513
published_at 2026-04-07T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06563
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06605
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06599
published_at 2026-04-11T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06591
published_at 2026-04-12T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06582
published_at 2026-04-13T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06522
published_at 2026-04-04T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06484
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414685
reference_id 2414685
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:28:39Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2414685
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-61664
reference_id CVE-2025-61664
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:28:39Z/
url https://access.redhat.com/security/cve/CVE-2025-61664
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-61664
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2vg-36gb-bqas
3
url VCID-gaet-924c-57dv
vulnerability_id VCID-gaet-924c-57dv
summary grub2: Use-after-free in net_set_vlan
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54770.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-54770
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02605
published_at 2026-04-26T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02519
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02629
published_at 2026-04-21T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02617
published_at 2026-04-24T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02767
published_at 2026-04-16T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08378
published_at 2026-04-07T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08449
published_at 2026-04-08T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08467
published_at 2026-04-09T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08462
published_at 2026-04-11T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-12T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08427
published_at 2026-04-13T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-04T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08405
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-54770
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413813
reference_id 2413813
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:33:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2413813
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-54770
reference_id CVE-2025-54770
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:33:53Z/
url https://access.redhat.com/security/cve/CVE-2025-54770
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-54770
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gaet-924c-57dv
4
url VCID-ur99-cm1x-cfdm
vulnerability_id VCID-ur99-cm1x-cfdm
summary grub2: Missing unregister call for normal commands may lead to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61663.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61663
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05277
published_at 2026-04-26T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05056
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05204
published_at 2026-04-21T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05235
published_at 2026-04-24T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.0531
published_at 2026-04-16T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08867
published_at 2026-04-07T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08943
published_at 2026-04-08T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-09T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-11T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08934
published_at 2026-04-12T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08921
published_at 2026-04-13T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08935
published_at 2026-04-04T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08884
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414684
reference_id 2414684
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:27:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2414684
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-61663
reference_id CVE-2025-61663
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:27:28Z/
url https://access.redhat.com/security/cve/CVE-2025-61663
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-61663
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ur99-cm1x-cfdm
5
url VCID-wy3p-p9zf-r7ef
vulnerability_id VCID-wy3p-p9zf-r7ef
summary grub2: grub2: Out-of-bounds write via malicious USB device
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61661.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61661
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06689
published_at 2026-04-26T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06514
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06666
published_at 2026-04-21T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06676
published_at 2026-04-24T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06892
published_at 2026-04-16T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11707
published_at 2026-04-07T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.1179
published_at 2026-04-08T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11843
published_at 2026-04-09T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11853
published_at 2026-04-11T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11814
published_at 2026-04-12T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11787
published_at 2026-04-13T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11921
published_at 2026-04-04T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11876
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
reference_id 1120968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413827
reference_id 2413827
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:18:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2413827
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-61661
reference_id CVE-2025-61661
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-19T14:18:04Z/
url https://access.redhat.com/security/cve/CVE-2025-61661
fixed_packages
0
url pkg:deb/debian/grub2@2.14-1?distro=trixie
purl pkg:deb/debian/grub2@2.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie
1
url pkg:deb/debian/grub2@2.14-2?distro=trixie
purl pkg:deb/debian/grub2@2.14-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-2%3Fdistro=trixie
aliases CVE-2025-61661
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wy3p-p9zf-r7ef
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/grub2@2.14-1%3Fdistro=trixie