{"url":"http://public2.vulnerablecode.io/api/packages/582403?format=json","purl":"pkg:deb/debian/binutils@2.35.2-2","type":"deb","namespace":"debian","name":"binutils","version":"2.35.2-2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.43.1-5","latest_non_vulnerable_version":"2.45.50.20251125-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71877?format=json","vulnerability_id":"VCID-2feg-zk6f-jqax","summary":"binutils: GNU Binutils ld elflink.c bfd_elf_reloc_symbol_deleted_p memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1182","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28137","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28297","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28342","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28479","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986","reference_id":"1108986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344853","reference_id":"2344853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344853"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15919","reference_id":"attachment.cgi?id=15919","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15919"},{"reference_url":"https://vuldb.com/?ctiid.295086","reference_id":"?ctiid.295086","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://vuldb.com/?ctiid.295086"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad"},{"reference_url":"https://vuldb.com/?id.295086","reference_id":"?id.295086","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://vuldb.com/?id.295086"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32644","reference_id":"show_bug.cgi?id=32644","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32644"},{"reference_url":"https://vuldb.com/?submit.495407","reference_id":"?submit.495407","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://vuldb.com/?submit.495407"},{"reference_url":"https://usn.ubuntu.com/7423-1/","reference_id":"USN-7423-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-1/"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:46:32Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1182"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2feg-zk6f-jqax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78829?format=json","vulnerability_id":"VCID-2sxq-338y-zudp","summary":"binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47673","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03536","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03682","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47673"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234013","reference_id":"2234013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234013"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29876","reference_id":"show_bug.cgi?id=29876","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:09:56Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29876"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47673"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sxq-338y-zudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78825?format=json","vulnerability_id":"VCID-3abw-ksjw-hkff","summary":"binutils: Field `file_table` of `struct module *module` is uninitialized","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25585","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06032","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05833","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05783","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05937","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0583","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167498","reference_id":"2167498","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167498"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-25585","reference_id":"CVE-2023-25585","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-25585"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231103-0003/","reference_id":"ntap-20231103-0003","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231103-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29892","reference_id":"show_bug.cgi?id=29892","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:20:22Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29892"},{"reference_url":"https://usn.ubuntu.com/6101-1/","reference_id":"USN-6101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6101-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2023-25585"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3abw-ksjw-hkff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78955?format=json","vulnerability_id":"VCID-3j3x-b5s8-p7c1","summary":"binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47695","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05332","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05141","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05196","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05102","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0529","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234027","reference_id":"2234027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234027"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29846","reference_id":"show_bug.cgi?id=29846","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:31:16Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29846"},{"reference_url":"https://usn.ubuntu.com/6381-1/","reference_id":"USN-6381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6381-1/"},{"reference_url":"https://usn.ubuntu.com/6655-1/","reference_id":"USN-6655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6655-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47695"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3j3x-b5s8-p7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67405?format=json","vulnerability_id":"VCID-4d5t-1hwt-43at","summary":"binutils: GNU Binutils out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11081","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0854","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11081"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399944","reference_id":"2399944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399944"},{"reference_url":"https://vuldb.com/?ctiid.326122","reference_id":"?ctiid.326122","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://vuldb.com/?ctiid.326122"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b"},{"reference_url":"https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt","reference_id":"hdf5_crash_3.txt","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt"},{"reference_url":"https://vuldb.com/?id.326122","reference_id":"?id.326122","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://vuldb.com/?id.326122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33406","reference_id":"show_bug.cgi?id=33406","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33406"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2","reference_id":"show_bug.cgi?id=33406#c2","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2"},{"reference_url":"https://vuldb.com/?submit.661275","reference_id":"?submit.661275","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://vuldb.com/?submit.661275"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:36:38Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11081"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4d5t-1hwt-43at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71890?format=json","vulnerability_id":"VCID-4k1k-tmj9-zyar","summary":"binutils: GNU Binutils ld xstrdup.c xstrdup memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1152.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1152","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14854","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15848","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23199","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344723","reference_id":"2344723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344723"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887","reference_id":"attachment.cgi?id=15887","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887"},{"reference_url":"https://vuldb.com/?ctiid.295056","reference_id":"?ctiid.295056","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/"}],"url":"https://vuldb.com/?ctiid.295056"},{"reference_url":"https://vuldb.com/?id.295056","reference_id":"?id.295056","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/"}],"url":"https://vuldb.com/?id.295056"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576","reference_id":"show_bug.cgi?id=32576","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T18:11:21Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1152"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4k1k-tmj9-zyar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47230?format=json","vulnerability_id":"VCID-4uea-bxbr-2kdz","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3530","reference_id":"","reference_type":"","scores":[{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57639","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57667","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57712","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956423","reference_id":"1956423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956423"},{"reference_url":"https://security.archlinux.org/AVG-1540","reference_id":"AVG-1540","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1540"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-30"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-3530"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uea-bxbr-2kdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79335?format=json","vulnerability_id":"VCID-5cqh-f862-zugq","summary":"binutils: memory leak in parse_stab_struct_fields() in stabs.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47011","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00862","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00908","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00909","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00913","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00869","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00856","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0085","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00857","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00906","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233992","reference_id":"2233992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233992"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29261","reference_id":"show_bug.cgi?id=29261","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:12:35Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29261"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47011"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cqh-f862-zugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78827?format=json","vulnerability_id":"VCID-5rak-8wp8-hqcm","summary":"binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25588.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25588","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05542","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05362","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05302","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05537","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05538","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05405","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167505","reference_id":"2167505","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167505"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-25588","reference_id":"CVE-2023-25588","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-25588"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231103-0003/","reference_id":"ntap-20231103-0003","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231103-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29677","reference_id":"show_bug.cgi?id=29677","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:22:06Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29677"},{"reference_url":"https://usn.ubuntu.com/6101-1/","reference_id":"USN-6101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6101-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2023-25588"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5rak-8wp8-hqcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47235?format=json","vulnerability_id":"VCID-66e8-kf7g-2bcv","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45078","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36718","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36769","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36785","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36448","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36359","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36245","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2033715","reference_id":"2033715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2033715"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-30"},{"reference_url":"https://usn.ubuntu.com/5341-1/","reference_id":"USN-5341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5341-1/"},{"reference_url":"https://usn.ubuntu.com/6160-1/","reference_id":"USN-6160-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6160-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-45078"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66e8-kf7g-2bcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80025?format=json","vulnerability_id":"VCID-6cjq-sz9f-mqf9","summary":"libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3826","reference_id":"","reference_type":"","scores":[{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.6809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.6816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68192","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00556","scoring_system":"epss","scoring_elements":"0.68216","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122627","reference_id":"2122627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3269","reference_id":"RHSA-2023:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6372","reference_id":"RHSA-2023:6372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6372"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-3826"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6cjq-sz9f-mqf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68484?format=json","vulnerability_id":"VCID-6kvf-hsu3-nfc3","summary":"binutils: Binutils DWARF Section Handler Memory Leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8225","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08345","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09595","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0943","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09561","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383686","reference_id":"2383686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383686"},{"reference_url":"https://vuldb.com/?ctiid.317813","reference_id":"?ctiid.317813","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/"}],"url":"https://vuldb.com/?ctiid.317813"},{"reference_url":"https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4","reference_id":"e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/"}],"url":"https://gitlab.com/gnutools/binutils-gdb/-/commit/e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4"},{"reference_url":"https://vuldb.com/?id.317813","reference_id":"?id.317813","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/"}],"url":"https://vuldb.com/?id.317813"},{"reference_url":"https://vuldb.com/?submit.621883","reference_id":"?submit.621883","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/"}],"url":"https://vuldb.com/?submit.621883"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T17:25:09Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-8225"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kvf-hsu3-nfc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68485?format=json","vulnerability_id":"VCID-6v51-g3b9-3qbf","summary":"binutils: Binutils BFD Null Pointer Dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8224","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08678","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12336","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12423","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12542","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383679","reference_id":"2383679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383679"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15680","reference_id":"attachment.cgi?id=15680","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15680"},{"reference_url":"https://vuldb.com/?ctiid.317812","reference_id":"?ctiid.317812","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://vuldb.com/?ctiid.317812"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=db856d41004301b3a56438efd957ef5cabb91530"},{"reference_url":"https://vuldb.com/?id.317812","reference_id":"?id.317812","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://vuldb.com/?id.317812"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32109","reference_id":"show_bug.cgi?id=32109","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32109"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2","reference_id":"show_bug.cgi?id=32109#c2","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32109#c2"},{"reference_url":"https://vuldb.com/?submit.621878","reference_id":"?submit.621878","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://vuldb.com/?submit.621878"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T16:59:03Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2025-8224"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6v51-g3b9-3qbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49739?format=json","vulnerability_id":"VCID-7sc8-fzw3-vfer","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35448","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32762","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55548","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55601","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55608","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1950478","reference_id":"1950478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1950478"},{"reference_url":"https://security.archlinux.org/AVG-1385","reference_id":"AVG-1385","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1385"},{"reference_url":"https://security.gentoo.org/glsa/202107-24","reference_id":"GLSA-202107-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4364","reference_id":"RHSA-2021:4364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2020-35448"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71881?format=json","vulnerability_id":"VCID-7vbm-bp51-4faa","summary":"binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1178","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31127","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986","reference_id":"1108986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344834","reference_id":"2344834","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344834"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15914","reference_id":"attachment.cgi?id=15914","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15914"},{"reference_url":"https://vuldb.com/?ctiid.295081","reference_id":"?ctiid.295081","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://vuldb.com/?ctiid.295081"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0"},{"reference_url":"https://vuldb.com/?id.295081","reference_id":"?id.295081","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://vuldb.com/?id.295081"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32638","reference_id":"show_bug.cgi?id=32638","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32638"},{"reference_url":"https://vuldb.com/?submit.495369","reference_id":"?submit.495369","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://vuldb.com/?submit.495369"},{"reference_url":"https://usn.ubuntu.com/7423-1/","reference_id":"USN-7423-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:29:07Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1178"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vbm-bp51-4faa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66929?format=json","vulnerability_id":"VCID-84t7-666n-fydn","summary":"binutils: GNU Binutils Linker out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11494","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10007","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11502","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402559","reference_id":"2402559","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402559"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16389","reference_id":"attachment.cgi?id=16389","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16389"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.327619","reference_id":"?ctiid.327619","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://vuldb.com/?ctiid.327619"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a"},{"reference_url":"https://vuldb.com/?id.327619","reference_id":"?id.327619","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://vuldb.com/?id.327619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33499","reference_id":"show_bug.cgi?id=33499","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33499"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2","reference_id":"show_bug.cgi?id=33499#c2","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2"},{"reference_url":"https://vuldb.com/?submit.668281","reference_id":"?submit.668281","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://vuldb.com/?submit.668281"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T19:41:15Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11494"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84t7-666n-fydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69492?format=json","vulnerability_id":"VCID-88yz-vyfa-xuec","summary":"binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5245","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24438","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24486","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24402","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5245"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368771","reference_id":"2368771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368771"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16004","reference_id":"attachment.cgi?id=16004","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16004"},{"reference_url":"https://vuldb.com/?ctiid.310347","reference_id":"?ctiid.310347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://vuldb.com/?ctiid.310347"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a"},{"reference_url":"https://vuldb.com/?id.310347","reference_id":"?id.310347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://vuldb.com/?id.310347"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32829","reference_id":"show_bug.cgi?id=32829","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32829"},{"reference_url":"https://vuldb.com/?submit.584635","reference_id":"?submit.584635","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://vuldb.com/?submit.584635"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T15:20:48Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-5245"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88yz-vyfa-xuec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66933?format=json","vulnerability_id":"VCID-8p5q-y7th-e7a3","summary":"binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11412","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07259","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402425","reference_id":"2402425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402425"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16378","reference_id":"attachment.cgi?id=16378","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16378"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.327348","reference_id":"?ctiid.327348","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://vuldb.com/?ctiid.327348"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc"},{"reference_url":"https://vuldb.com/?id.327348","reference_id":"?id.327348","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://vuldb.com/?id.327348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452","reference_id":"show_bug.cgi?id=33452","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8","reference_id":"show_bug.cgi?id=33452#c8","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452#c8"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:39:40Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11412"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p5q-y7th-e7a3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78793?format=json","vulnerability_id":"VCID-9v6f-mzak-87d6","summary":"binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48064","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00935","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00888","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00877","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00878","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00876","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00932","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00936","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0094","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00934","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0089","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00892","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00896","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00894","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00883","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233958","reference_id":"2233958","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233958"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/","reference_id":"3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931","reference_id":"gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8f2c64de86bc3d7556121fe296dd679000283931"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","reference_id":"KGSKF4GH7425S6XFDQMWTJGD5U47BAZN","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/","reference_id":"NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0008/","reference_id":"ntap-20231006-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0008/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29922","reference_id":"show_bug.cgi?id=29922","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:24:28Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29922"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-48064"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9v6f-mzak-87d6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67403?format=json","vulnerability_id":"VCID-a6f4-kkt1-yugs","summary":"binutils: GNU Binutils Linker heap-based overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11083","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06548","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07615","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07636","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11083"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399948","reference_id":"2399948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399948"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16353","reference_id":"attachment.cgi?id=16353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16353"},{"reference_url":"https://vuldb.com/?ctiid.326124","reference_id":"?ctiid.326124","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://vuldb.com/?ctiid.326124"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490"},{"reference_url":"https://vuldb.com/?id.326124","reference_id":"?id.326124","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://vuldb.com/?id.326124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23232","reference_id":"RHSA-2025:23232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23233","reference_id":"RHSA-2025:23233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23306","reference_id":"RHSA-2025:23306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23336","reference_id":"RHSA-2025:23336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23343","reference_id":"RHSA-2025:23343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23359","reference_id":"RHSA-2025:23359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23382","reference_id":"RHSA-2025:23382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23400","reference_id":"RHSA-2025:23400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23405","reference_id":"RHSA-2025:23405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0052","reference_id":"RHSA-2026:0052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0108","reference_id":"RHSA-2026:0108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0341","reference_id":"RHSA-2026:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0342","reference_id":"RHSA-2026:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0343","reference_id":"RHSA-2026:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0479","reference_id":"RHSA-2026:0479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0480","reference_id":"RHSA-2026:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0481","reference_id":"RHSA-2026:0481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0482","reference_id":"RHSA-2026:0482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0685","reference_id":"RHSA-2026:0685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0978","reference_id":"RHSA-2026:0978","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0978"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1359","reference_id":"RHSA-2026:1359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1539","reference_id":"RHSA-2026:1539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2627","reference_id":"RHSA-2026:2627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33457","reference_id":"show_bug.cgi?id=33457","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33457"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1","reference_id":"show_bug.cgi?id=33457#c1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1"},{"reference_url":"https://vuldb.com/?submit.661277","reference_id":"?submit.661277","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://vuldb.com/?submit.661277"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T14:55:22Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11083"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6f4-kkt1-yugs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71892?format=json","vulnerability_id":"VCID-b7k7-s2rd-j3h1","summary":"binutils: GNU Binutils ld libbfd.c bfd_malloc memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1150","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14854","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14947","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344681","reference_id":"2344681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344681"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887","reference_id":"attachment.cgi?id=15887","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887"},{"reference_url":"https://vuldb.com/?ctiid.295054","reference_id":"?ctiid.295054","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/"}],"url":"https://vuldb.com/?ctiid.295054"},{"reference_url":"https://vuldb.com/?id.295054","reference_id":"?id.295054","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/"}],"url":"https://vuldb.com/?id.295054"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576","reference_id":"show_bug.cgi?id=32576","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:38:39Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1150"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7k7-s2rd-j3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79321?format=json","vulnerability_id":"VCID-bmef-m4dw-kbeu","summary":"binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35206","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07209","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07195","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07216","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233975","reference_id":"2233975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233975"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29290","reference_id":"show_bug.cgi?id=29290","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:32:59Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29290"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-35206"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bmef-m4dw-kbeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80626?format=json","vulnerability_id":"VCID-by8y-uamt-f7bt","summary":"gcc: uncontrolled recursion in libiberty/rust-demangle.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46195.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46195","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45975","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50632","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5058","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50543","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046300","reference_id":"2046300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2046300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8415","reference_id":"RHSA-2022:8415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8415"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-46195"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-by8y-uamt-f7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79836?format=json","vulnerability_id":"VCID-cjbb-xm4r-c3b5","summary":"binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46174","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10789","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10917","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11054","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1107","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10912","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46174"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234003","reference_id":"2234003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234003"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28753","reference_id":"show_bug.cgi?id=28753","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:53:41Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28753"},{"reference_url":"https://usn.ubuntu.com/6381-1/","reference_id":"USN-6381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6381-1/"},{"reference_url":"https://usn.ubuntu.com/6544-1/","reference_id":"USN-6544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6544-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-46174"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjbb-xm4r-c3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78790?format=json","vulnerability_id":"VCID-cxp6-cmpk-7uff","summary":"binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48063","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.0307","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03064","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48063"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233949","reference_id":"2233949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233949"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd","reference_id":"gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75393a2d54bcc40053e5262a3de9d70c5ebfbbfd"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0008/","reference_id":"ntap-20231006-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0008/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29924","reference_id":"show_bug.cgi?id=29924","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:30:27Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29924"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6655-1/","reference_id":"USN-6655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6655-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-48063"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cxp6-cmpk-7uff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66928?format=json","vulnerability_id":"VCID-dfhw-bvdv-4udd","summary":"binutils: GNU Binutils Linker heap-based overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11495","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07259","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402584","reference_id":"2402584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402584"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16393","reference_id":"attachment.cgi?id=16393","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16393"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.327620","reference_id":"?ctiid.327620","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://vuldb.com/?ctiid.327620"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0"},{"reference_url":"https://vuldb.com/?id.327620","reference_id":"?id.327620","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://vuldb.com/?id.327620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33502","reference_id":"show_bug.cgi?id=33502","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33502"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3","reference_id":"show_bug.cgi?id=33502#c3","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3"},{"reference_url":"https://vuldb.com/?submit.668290","reference_id":"?submit.668290","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://vuldb.com/?submit.668290"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T20:25:11Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11495"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfhw-bvdv-4udd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79334?format=json","vulnerability_id":"VCID-e8f4-9g99-6yet","summary":"binutils: memory leak in pr_function_type() in prdbg.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47010","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02651","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02663","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233988","reference_id":"2233988","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233988"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29262","reference_id":"show_bug.cgi?id=29262","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T15:31:53Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29262"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47010"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8f4-9g99-6yet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71878?format=json","vulnerability_id":"VCID-ek5t-65by-syac","summary":"binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1181","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30019","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30354","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30589","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30748","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986","reference_id":"1108986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344852","reference_id":"2344852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344852"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15918","reference_id":"attachment.cgi?id=15918","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15918"},{"reference_url":"https://vuldb.com/?ctiid.295084","reference_id":"?ctiid.295084","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://vuldb.com/?ctiid.295084"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24"},{"reference_url":"https://vuldb.com/?id.295084","reference_id":"?id.295084","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://vuldb.com/?id.295084"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32643","reference_id":"show_bug.cgi?id=32643","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32643"},{"reference_url":"https://vuldb.com/?submit.495402","reference_id":"?submit.495402","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://vuldb.com/?submit.495402"},{"reference_url":"https://usn.ubuntu.com/7423-1/","reference_id":"USN-7423-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:50:50Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1181"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5t-65by-syac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78824?format=json","vulnerability_id":"VCID-f47d-fm3y-q3b9","summary":"binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25584","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0257","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02668","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02589","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167467","reference_id":"2167467","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-25584","reference_id":"CVE-2023-25584","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-25584"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231103-0002/","reference_id":"ntap-20231103-0002","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:33:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231103-0002/"},{"reference_url":"https://usn.ubuntu.com/6101-1/","reference_id":"USN-6101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6101-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2023-25584"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f47d-fm3y-q3b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72018?format=json","vulnerability_id":"VCID-ftkb-qtse-afhq","summary":"binutils: nm: potential segmentation fault when displaying symbols without version info","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-57360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-57360","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04876","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04877","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04705","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05705","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05746","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-57360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57360"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339263","reference_id":"2339263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339263"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32467","reference_id":"show_bug.cgi?id=32467","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T15:50:28Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32467"},{"reference_url":"https://usn.ubuntu.com/7306-1/","reference_id":"USN-7306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2024-57360"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftkb-qtse-afhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39614?format=json","vulnerability_id":"VCID-fx6h-7q2k-5fd2","summary":"Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1972","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15861","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19102","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19214","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185646","reference_id":"2185646","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185646"},{"reference_url":"https://security.gentoo.org/glsa/202309-15","reference_id":"GLSA-202309-15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/"}],"url":"https://security.gentoo.org/glsa/202309-15"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30285","reference_id":"show_bug.cgi?id=30285","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T19:45:08Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30285"},{"reference_url":"https://usn.ubuntu.com/6101-1/","reference_id":"USN-6101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6101-1/"},{"reference_url":"https://usn.ubuntu.com/6842-1/","reference_id":"USN-6842-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6842-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2023-1972"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fx6h-7q2k-5fd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66932?format=json","vulnerability_id":"VCID-hd32-zxxu-6bh4","summary":"binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11413","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06886","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06777","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07972","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402423","reference_id":"2402423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402423"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16362","reference_id":"attachment.cgi?id=16362","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16362"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.327349","reference_id":"?ctiid.327349","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://vuldb.com/?ctiid.327349"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0"},{"reference_url":"https://vuldb.com/?id.327349","reference_id":"?id.327349","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://vuldb.com/?id.327349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452","reference_id":"show_bug.cgi?id=33452","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33452"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10","reference_id":"show_bug.cgi?id=33456#c10","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33456#c10"},{"reference_url":"https://vuldb.com/?submit.665587","reference_id":"?submit.665587","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://vuldb.com/?submit.665587"},{"reference_url":"https://vuldb.com/?submit.665590","reference_id":"?submit.665590","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://vuldb.com/?submit.665590"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T14:38:58Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11413"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hd32-zxxu-6bh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47233?format=json","vulnerability_id":"VCID-hsyc-q23j-2ua3","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20284","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25792","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25636","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25875","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1937784","reference_id":"1937784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1937784"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4364","reference_id":"RHSA-2021:4364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-20284"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsyc-q23j-2ua3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69493?format=json","vulnerability_id":"VCID-j49e-hexk-7kgd","summary":"binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5244","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23572","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23693","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23992","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23862","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2408","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368763","reference_id":"2368763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368763"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16010","reference_id":"attachment.cgi?id=16010","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16010"},{"reference_url":"https://vuldb.com/?ctiid.310346","reference_id":"?ctiid.310346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://vuldb.com/?ctiid.310346"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5"},{"reference_url":"https://vuldb.com/?id.310346","reference_id":"?id.310346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://vuldb.com/?id.310346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20155","reference_id":"RHSA-2025:20155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20155"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32858","reference_id":"show_bug.cgi?id=32858","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32858"},{"reference_url":"https://vuldb.com/?submit.584634","reference_id":"?submit.584634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://vuldb.com/?submit.584634"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-27T13:31:20Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-5244"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j49e-hexk-7kgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71940?format=json","vulnerability_id":"VCID-jm7b-4gnb-uygv","summary":"binutils: GNU Binutils objdump.c disassemble_bytes stack-based overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0840","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27468","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27294","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342875","reference_id":"2342875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2342875"},{"reference_url":"https://usn.ubuntu.com/7306-1/","reference_id":"USN-7306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7306-1/"},{"reference_url":"https://usn.ubuntu.com/7423-2/","reference_id":"USN-7423-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-2/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2025-0840"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7b-4gnb-uygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78867?format=json","vulnerability_id":"VCID-k4nr-2da1-jke3","summary":"binutils: heap-based buffer overflow in display_debug_section() in readelf.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45703","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06565","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06721","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45703"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234012","reference_id":"2234012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234012"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0003/","reference_id":"ntap-20231006-0003","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29799","reference_id":"show_bug.cgi?id=29799","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:14:43Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29799"},{"reference_url":"https://usn.ubuntu.com/6381-1/","reference_id":"USN-6381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6381-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-45703"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4nr-2da1-jke3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66868?format=json","vulnerability_id":"VCID-k6ey-kdwp-17ed","summary":"binutils: GNU Binutils prdbg.c tg_tag_type return value","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11839","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06209","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06224","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404439","reference_id":"2404439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404439"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16344","reference_id":"attachment.cgi?id=16344","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16344"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.328774","reference_id":"?ctiid.328774","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://vuldb.com/?ctiid.328774"},{"reference_url":"https://vuldb.com/?id.328774","reference_id":"?id.328774","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://vuldb.com/?id.328774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33448","reference_id":"show_bug.cgi?id=33448","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33448"},{"reference_url":"https://vuldb.com/?submit.661279","reference_id":"?submit.661279","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://vuldb.com/?submit.661279"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T14:14:58Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11839"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ey-kdwp-17ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66931?format=json","vulnerability_id":"VCID-kh2b-vdkt-nkep","summary":"binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11414","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07259","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402424","reference_id":"2402424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2402424"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16361","reference_id":"attachment.cgi?id=16361","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16361"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.327350","reference_id":"?ctiid.327350","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://vuldb.com/?ctiid.327350"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703"},{"reference_url":"https://vuldb.com/?id.327350","reference_id":"?id.327350","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://vuldb.com/?id.327350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33450","reference_id":"show_bug.cgi?id=33450","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33450"},{"reference_url":"https://vuldb.com/?submit.665591","reference_id":"?submit.665591","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://vuldb.com/?submit.665591"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-08T13:45:45Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11414"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kh2b-vdkt-nkep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78791?format=json","vulnerability_id":"VCID-kvn8-qddz-vqag","summary":"binutils: memory leak in find_abstract_instance() in dwarf2.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48065","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0536","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05369","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05138","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48065"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233963","reference_id":"2233963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233963"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a","reference_id":"gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d28fbc7197ba0e021a43f873eff90b05dcdcff6a"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/","reference_id":"GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/","reference_id":"KGSKF4GH7425S6XFDQMWTJGD5U47BAZN","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KGSKF4GH7425S6XFDQMWTJGD5U47BAZN/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0008/","reference_id":"ntap-20231006-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0008/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29925","reference_id":"show_bug.cgi?id=29925","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:44:52Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29925"},{"reference_url":"https://usn.ubuntu.com/6655-1/","reference_id":"USN-6655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6655-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-48065"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvn8-qddz-vqag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79320?format=json","vulnerability_id":"VCID-mtb5-2vq5-4yf7","summary":"binutils: reachable assertion in display_debug_names() in dwarf.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35205","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05312","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05301","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35205"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233969","reference_id":"2233969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233969"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231006-0010/","reference_id":"ntap-20231006-0010","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231006-0010/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29289","reference_id":"show_bug.cgi?id=29289","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T17:36:08Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29289"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6544-1/","reference_id":"USN-6544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6544-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-35205"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mtb5-2vq5-4yf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68663?format=json","vulnerability_id":"VCID-pejn-n3rz-33bs","summary":"binutils: Binutils: Out-of-bounds Write Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7546","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06541","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06393","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06572","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379793","reference_id":"2379793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379793"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16118","reference_id":"attachment.cgi?id=16118","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16118"},{"reference_url":"https://vuldb.com/?ctiid.316244","reference_id":"?ctiid.316244","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://vuldb.com/?ctiid.316244"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b"},{"reference_url":"https://vuldb.com/?id.316244","reference_id":"?id.316244","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://vuldb.com/?id.316244"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33050","reference_id":"show_bug.cgi?id=33050","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33050"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2","reference_id":"show_bug.cgi?id=33050#c2","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2"},{"reference_url":"https://vuldb.com/?submit.614375","reference_id":"?submit.614375","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://vuldb.com/?submit.614375"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:00:51Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-7546"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pejn-n3rz-33bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71889?format=json","vulnerability_id":"VCID-pjtw-r398-uqgw","summary":"binutils: GNU Binutils format.c bfd_set_format memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1153","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24323","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25184","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344743","reference_id":"2344743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344743"},{"reference_url":"https://vuldb.com/?ctiid.295057","reference_id":"?ctiid.295057","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://vuldb.com/?ctiid.295057"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150"},{"reference_url":"https://vuldb.com/?id.295057","reference_id":"?id.295057","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://vuldb.com/?id.295057"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32603","reference_id":"show_bug.cgi?id=32603","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32603"},{"reference_url":"https://vuldb.com/?submit.489991","reference_id":"?submit.489991","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://vuldb.com/?submit.489991"},{"reference_url":"https://usn.ubuntu.com/7423-1/","reference_id":"USN-7423-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-1/"},{"reference_url":"https://usn.ubuntu.com/7423-2/","reference_id":"USN-7423-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-2/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T23:17:42Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1153"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pjtw-r398-uqgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78284?format=json","vulnerability_id":"VCID-pkej-frsd-gqdk","summary":"binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-19726","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27048","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.268","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-19726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233934","reference_id":"2233934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233934"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26240","reference_id":"show_bug.cgi?id=26240","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26240"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26241","reference_id":"show_bug.cgi?id=26241","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:23:24Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26241"},{"reference_url":"https://usn.ubuntu.com/6381-1/","reference_id":"USN-6381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6381-1/"},{"reference_url":"https://usn.ubuntu.com/6544-1/","reference_id":"USN-6544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6544-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2020-19726"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pkej-frsd-gqdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39613?format=json","vulnerability_id":"VCID-q1nv-rtqz-4fhk","summary":"Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1579.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1579","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18845","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19009","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19129","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180905","reference_id":"2180905","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180905"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8","reference_id":"gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8"},{"reference_url":"https://security.gentoo.org/glsa/202309-15","reference_id":"GLSA-202309-15","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/"}],"url":"https://security.gentoo.org/glsa/202309-15"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230511-0009/","reference_id":"ntap-20230511-0009","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230511-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2353","reference_id":"RHSA-2024:2353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2353"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29988","reference_id":"show_bug.cgi?id=29988","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:55:19Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29988"},{"reference_url":"https://usn.ubuntu.com/6101-1/","reference_id":"USN-6101-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6101-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2023-1579"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1nv-rtqz-4fhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78826?format=json","vulnerability_id":"VCID-r1u7-ujc5-g7aw","summary":"binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25586","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09068","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09208","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09206","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167502","reference_id":"2167502","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167502"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-25586","reference_id":"CVE-2023-25586","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-25586"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231103-0003/","reference_id":"ntap-20231103-0003","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231103-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29855","reference_id":"show_bug.cgi?id=29855","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T18:21:11Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29855"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2023-25586"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1u7-ujc5-g7aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39612?format=json","vulnerability_id":"VCID-rcs3-znj9-pbb8","summary":"Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38533","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0843","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08391","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08275","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124569","reference_id":"2124569","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124569"},{"reference_url":"https://security.gentoo.org/glsa/202309-15","reference_id":"GLSA-202309-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-15"},{"reference_url":"https://usn.ubuntu.com/5762-1/","reference_id":"USN-5762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5762-1/"},{"reference_url":"https://usn.ubuntu.com/6544-1/","reference_id":"USN-6544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6544-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-38533"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcs3-znj9-pbb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78896?format=json","vulnerability_id":"VCID-rcxk-qvqu-y3fj","summary":"binutils: heap-based buffer overflow in find_section_in_set() in readelf.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-44840","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06768","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06777","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-44840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234004","reference_id":"2234004","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234004"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29732","reference_id":"show_bug.cgi?id=29732","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:15:25Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29732"},{"reference_url":"https://usn.ubuntu.com/6381-1/","reference_id":"USN-6381-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6381-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-44840"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcxk-qvqu-y3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71880?format=json","vulnerability_id":"VCID-sdx4-5wtj-hbf9","summary":"binutils: GNU Binutils ld libbfd.c bfd_putl64 memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1179","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27911","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28443","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30279","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344844","reference_id":"2344844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344844"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15915","reference_id":"attachment.cgi?id=15915","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15915"},{"reference_url":"https://vuldb.com/?ctiid.295082","reference_id":"?ctiid.295082","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://vuldb.com/?ctiid.295082"},{"reference_url":"https://vuldb.com/?id.295082","reference_id":"?id.295082","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://vuldb.com/?id.295082"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32640","reference_id":"show_bug.cgi?id=32640","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32640"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1","reference_id":"show_bug.cgi?id=32640#c1","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1"},{"reference_url":"https://vuldb.com/?submit.495376","reference_id":"?submit.495376","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://vuldb.com/?submit.495376"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:15:06Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2025-1179"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sdx4-5wtj-hbf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71897?format=json","vulnerability_id":"VCID-syyt-ureu-23h8","summary":"binutils: GNU Binutils nm nm.c internal_strlen buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1147","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20552","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20821","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344647","reference_id":"2344647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344647"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15881","reference_id":"attachment.cgi?id=15881","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15881"},{"reference_url":"https://vuldb.com/?ctiid.295051","reference_id":"?ctiid.295051","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://vuldb.com/?ctiid.295051"},{"reference_url":"https://vuldb.com/?id.295051","reference_id":"?id.295051","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://vuldb.com/?id.295051"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32556","reference_id":"show_bug.cgi?id=32556","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32556"},{"reference_url":"https://vuldb.com/?submit.485254","reference_id":"?submit.485254","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://vuldb.com/?submit.485254"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T15:15:12Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1147"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-syyt-ureu-23h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71882?format=json","vulnerability_id":"VCID-t9qr-esv2-g7he","summary":"binutils: GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1176","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43883","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43691","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43817","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.4383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.4388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47501","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986","reference_id":"1108986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344833","reference_id":"2344833","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344833"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15913","reference_id":"attachment.cgi?id=15913","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15913"},{"reference_url":"https://vuldb.com/?ctiid.295079","reference_id":"?ctiid.295079","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://vuldb.com/?ctiid.295079"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814"},{"reference_url":"https://vuldb.com/?id.295079","reference_id":"?id.295079","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://vuldb.com/?id.295079"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32636","reference_id":"show_bug.cgi?id=32636","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32636"},{"reference_url":"https://vuldb.com/?submit.495329","reference_id":"?submit.495329","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://vuldb.com/?submit.495329"},{"reference_url":"https://usn.ubuntu.com/7423-1/","reference_id":"USN-7423-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-1/"},{"reference_url":"https://usn.ubuntu.com/7423-2/","reference_id":"USN-7423-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7423-2/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:17:22Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1176"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9qr-esv2-g7he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79337?format=json","vulnerability_id":"VCID-tcc9-936c-vkhk","summary":"binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47008","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0268","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02651","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02663","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233984","reference_id":"2233984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233984"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20","reference_id":"show_bug.cgi?id=29255%20","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:13:36Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47008"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tcc9-936c-vkhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67404?format=json","vulnerability_id":"VCID-tmj2-8abu-fuen","summary":"binutils: GNU Binutils Linker heap-based overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11082","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0564","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.055","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06493","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06471","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399943","reference_id":"2399943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2399943"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16358","reference_id":"attachment.cgi?id=16358","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16358"},{"reference_url":"https://vuldb.com/?ctiid.326123","reference_id":"?ctiid.326123","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://vuldb.com/?ctiid.326123"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8"},{"reference_url":"https://vuldb.com/?id.326123","reference_id":"?id.326123","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://vuldb.com/?id.326123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23306","reference_id":"RHSA-2025:23306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23405","reference_id":"RHSA-2025:23405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23405"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33464","reference_id":"show_bug.cgi?id=33464","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33464"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2","reference_id":"show_bug.cgi?id=33464#c2","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2"},{"reference_url":"https://vuldb.com/?submit.661276","reference_id":"?submit.661276","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://vuldb.com/?submit.661276"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7919-1/","reference_id":"USN-7919-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7919-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-29T19:37:10Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11082"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmj2-8abu-fuen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82342?format=json","vulnerability_id":"VCID-ugns-tvmf-e7c7","summary":"binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-1010204","reference_id":"","reference_type":"","scores":[{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34269","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34101","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.33891","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-1010204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735604","reference_id":"1735604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1797","reference_id":"RHSA-2020:1797","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1797"},{"reference_url":"https://usn.ubuntu.com/5349-1/","reference_id":"USN-5349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2019-1010204"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ugns-tvmf-e7c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39607?format=json","vulnerability_id":"VCID-uqym-35ay-uua8","summary":"Multiple vulnerabilities have been found in GNU Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4285.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4285","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17437","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1784","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17797","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17579","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17824","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150768","reference_id":"2150768","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2150768"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70","reference_id":"gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70"},{"reference_url":"https://security.gentoo.org/glsa/202309-15","reference_id":"GLSA-202309-15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/"}],"url":"https://security.gentoo.org/glsa/202309-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2873","reference_id":"RHSA-2023:2873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3269","reference_id":"RHSA-2023:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6236","reference_id":"RHSA-2023:6236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6593","reference_id":"RHSA-2023:6593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7394","reference_id":"RHSA-2023:7394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7394"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29699","reference_id":"show_bug.cgi?id=29699","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-28T15:40:22Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29699"},{"reference_url":"https://usn.ubuntu.com/6544-1/","reference_id":"USN-6544-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6544-1/"},{"reference_url":"https://usn.ubuntu.com/6842-1/","reference_id":"USN-6842-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6842-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-4285"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqym-35ay-uua8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47231?format=json","vulnerability_id":"VCID-uv5p-15z7-fqcn","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3549","reference_id":"","reference_type":"","scores":[{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57075","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57168","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57182","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57161","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57143","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57074","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960717","reference_id":"1960717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1960717"},{"reference_url":"https://security.archlinux.org/AVG-2002","reference_id":"AVG-2002","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2002"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-30"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-3549"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uv5p-15z7-fqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71896?format=json","vulnerability_id":"VCID-vcgu-7pzk-2udx","summary":"binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1148","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2211","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344652","reference_id":"2344652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344652"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887","reference_id":"attachment.cgi?id=15887","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887"},{"reference_url":"https://vuldb.com/?ctiid.295052","reference_id":"?ctiid.295052","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://vuldb.com/?ctiid.295052"},{"reference_url":"https://vuldb.com/?id.295052","reference_id":"?id.295052","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://vuldb.com/?id.295052"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576","reference_id":"show_bug.cgi?id=32576","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576"},{"reference_url":"https://vuldb.com/?submit.485747","reference_id":"?submit.485747","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://vuldb.com/?submit.485747"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:32:01Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1148"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vcgu-7pzk-2udx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79336?format=json","vulnerability_id":"VCID-vj46-k8jn-a7ew","summary":"binutils: memory leak in stab_demangle_v3_arg() in stabs.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47007","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00862","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00908","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00909","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00913","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00869","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00867","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00856","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0085","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00857","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00906","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233980","reference_id":"2233980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2233980"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29254","reference_id":"show_bug.cgi?id=29254","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:14:11Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29254"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"},{"reference_url":"https://usn.ubuntu.com/6581-1/","reference_id":"USN-6581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47007"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vj46-k8jn-a7ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72625?format=json","vulnerability_id":"VCID-vjrz-ss5c-skcc","summary":"binutils: objdump: buffer Overflow in the BFD library's handling of tekhex format files","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53589","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39609","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.4635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46203","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53589"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330669","reference_id":"2330669","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2330669"},{"reference_url":"https://www.gnu.org/software/binutils/","reference_id":"binutils","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/"}],"url":"https://www.gnu.org/software/binutils/"},{"reference_url":"https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/","reference_id":"binutils-objdump-tekhex-buffer-overflow","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-12-11T16:27:26Z/"}],"url":"https://bushido-sec.com/index.php/2024/12/05/binutils-objdump-tekhex-buffer-overflow/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"}],"aliases":["CVE-2024-53589"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjrz-ss5c-skcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66867?format=json","vulnerability_id":"VCID-vwk2-2pwb-muhu","summary":"binutils: GNU Binutils out-of-bounds read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11840","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07916","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08018","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08055","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404481","reference_id":"2404481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404481"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16351","reference_id":"attachment.cgi?id=16351","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16351"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16357","reference_id":"attachment.cgi?id=16357","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16357"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"},{"reference_url":"https://vuldb.com/?ctiid.328775","reference_id":"?ctiid.328775","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://vuldb.com/?ctiid.328775"},{"reference_url":"https://vuldb.com/?id.328775","reference_id":"?id.328775","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://vuldb.com/?id.328775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7098","reference_id":"RHSA-2026:7098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7098"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33455","reference_id":"show_bug.cgi?id=33455","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33455"},{"reference_url":"https://vuldb.com/?submit.661281","reference_id":"?submit.661281","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://vuldb.com/?submit.661281"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-16T18:11:52Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-11840"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwk2-2pwb-muhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71879?format=json","vulnerability_id":"VCID-wj3y-5jmt-7ugw","summary":"binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1180","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23803","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24146","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986","reference_id":"1108986","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108986"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344846","reference_id":"2344846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344846"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15917","reference_id":"attachment.cgi?id=15917","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15917"},{"reference_url":"https://vuldb.com/?ctiid.295083","reference_id":"?ctiid.295083","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://vuldb.com/?ctiid.295083"},{"reference_url":"https://vuldb.com/?id.295083","reference_id":"?id.295083","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://vuldb.com/?id.295083"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32642","reference_id":"show_bug.cgi?id=32642","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32642"},{"reference_url":"https://vuldb.com/?submit.495381","reference_id":"?submit.495381","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://vuldb.com/?submit.495381"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T14:54:30Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1180"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3y-5jmt-7ugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70462?format=json","vulnerability_id":"VCID-x3kv-wwqy-8bav","summary":"binutils: GNU Binutils objdump bucomm.c display_info memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3198","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21029","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21072","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21056","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21202","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357358","reference_id":"2357358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357358"},{"reference_url":"https://vuldb.com/?ctiid.303151","reference_id":"?ctiid.303151","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://vuldb.com/?ctiid.303151"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d"},{"reference_url":"https://vuldb.com/?id.303151","reference_id":"?id.303151","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://vuldb.com/?id.303151"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32716","reference_id":"show_bug.cgi?id=32716","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32716"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0","reference_id":"show_bug.cgi?id=32716#c0","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0"},{"reference_url":"https://vuldb.com/?submit.545773","reference_id":"?submit.545773","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://vuldb.com/?submit.545773"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T14:36:25Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-3198"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3kv-wwqy-8bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78844?format=json","vulnerability_id":"VCID-xdh7-9hu5-vfa6","summary":"binutils: segmentation fault in compare_symbols() in objdump.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47696","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03656","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03536","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03682","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234029","reference_id":"2234029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234029"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29677","reference_id":"show_bug.cgi?id=29677","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:26:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29677"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2022-47696"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xdh7-9hu5-vfa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71891?format=json","vulnerability_id":"VCID-y2a1-fczv-k7e2","summary":"binutils: GNU Binutils ld xmemdup.c xmemdup memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1151","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14854","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23218","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23052","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344713","reference_id":"2344713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344713"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887","reference_id":"attachment.cgi?id=15887","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887"},{"reference_url":"https://vuldb.com/?ctiid.295055","reference_id":"?ctiid.295055","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/"}],"url":"https://vuldb.com/?ctiid.295055"},{"reference_url":"https://vuldb.com/?id.295055","reference_id":"?id.295055","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/"}],"url":"https://vuldb.com/?id.295055"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576","reference_id":"show_bug.cgi?id=32576","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:07:37Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1151"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2a1-fczv-k7e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68664?format=json","vulnerability_id":"VCID-ycgk-1xz6-h3fm","summary":"binutils: Binutils: Heap Buffer Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7545","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07111","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07213","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379785","reference_id":"2379785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379785"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=16117","reference_id":"attachment.cgi?id=16117","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=16117"},{"reference_url":"https://vuldb.com/?ctiid.316243","reference_id":"?ctiid.316243","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://vuldb.com/?ctiid.316243"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944","reference_id":"gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944"},{"reference_url":"https://vuldb.com/?id.316243","reference_id":"?id.316243","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://vuldb.com/?id.316243"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049","reference_id":"show_bug.cgi?id=33049","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1","reference_id":"show_bug.cgi?id=33049#c1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1"},{"reference_url":"https://vuldb.com/?submit.614355","reference_id":"?submit.614355","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://vuldb.com/?submit.614355"},{"reference_url":"https://usn.ubuntu.com/7718-1/","reference_id":"USN-7718-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7718-1/"},{"reference_url":"https://usn.ubuntu.com/7847-1/","reference_id":"USN-7847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7847-1/"},{"reference_url":"https://usn.ubuntu.com/7899-1/","reference_id":"USN-7899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7899-1/"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C"},{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T16:43:40Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-7545"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycgk-1xz6-h3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71895?format=json","vulnerability_id":"VCID-z1d7-yjdv-hyh8","summary":"binutils: GNU Binutils ld xmalloc.c xstrdup memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1149.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1149","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14854","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15848","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15704","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344651","reference_id":"2344651","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344651"},{"reference_url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887","reference_id":"attachment.cgi?id=15887","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/"}],"url":"https://sourceware.org/bugzilla/attachment.cgi?id=15887"},{"reference_url":"https://vuldb.com/?ctiid.295053","reference_id":"?ctiid.295053","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/"}],"url":"https://vuldb.com/?ctiid.295053"},{"reference_url":"https://vuldb.com/?id.295053","reference_id":"?id.295053","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/"}],"url":"https://vuldb.com/?id.295053"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576","reference_id":"show_bug.cgi?id=32576","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32576"},{"reference_url":"https://www.gnu.org/","reference_id":"www.gnu.org","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T14:47:29Z/"}],"url":"https://www.gnu.org/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582405?format=json","purl":"pkg:deb/debian/binutils@2.43.1-5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.43.1-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582407?format=json","purl":"pkg:deb/debian/binutils@2.45.50.20251125-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.45.50.20251125-1"}],"aliases":["CVE-2025-1149"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1d7-yjdv-hyh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47232?format=json","vulnerability_id":"VCID-znqk-35mz-dqfk","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20197","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29745","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.302","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30181","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30068","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30361","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30238","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913743","reference_id":"1913743","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1913743"},{"reference_url":"https://security.archlinux.org/AVG-1540","reference_id":"AVG-1540","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1540"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/"}],"url":"https://security.gentoo.org/glsa/202208-30"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210528-0009/","reference_id":"ntap-20210528-0009","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210528-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4364","reference_id":"RHSA-2021:4364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4364"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26945","reference_id":"show_bug.cgi?id=26945","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:08:08Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26945"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582404?format=json","purl":"pkg:deb/debian/binutils@2.40-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.40-2"}],"aliases":["CVE-2021-20197"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-znqk-35mz-dqfk"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47234?format=json","vulnerability_id":"VCID-vepg-jnnm-97d7","summary":"Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20294","reference_id":"","reference_type":"","scores":[{"value":"0.1586","scoring_system":"epss","scoring_elements":"0.9472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1586","scoring_system":"epss","scoring_elements":"0.94712","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1586","scoring_system":"epss","scoring_elements":"0.94724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95897","published_at":"2026-05-05T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.9586","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22712","scoring_system":"epss","scoring_elements":"0.95881","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1943533","reference_id":"1943533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1943533"},{"reference_url":"https://security.archlinux.org/AVG-1385","reference_id":"AVG-1385","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1385"},{"reference_url":"https://security.gentoo.org/glsa/202208-30","reference_id":"GLSA-202208-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-30"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582403?format=json","purl":"pkg:deb/debian/binutils@2.35.2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2feg-zk6f-jqax"},{"vulnerability":"VCID-2sxq-338y-zudp"},{"vulnerability":"VCID-3abw-ksjw-hkff"},{"vulnerability":"VCID-3j3x-b5s8-p7c1"},{"vulnerability":"VCID-4d5t-1hwt-43at"},{"vulnerability":"VCID-4k1k-tmj9-zyar"},{"vulnerability":"VCID-4uea-bxbr-2kdz"},{"vulnerability":"VCID-5cqh-f862-zugq"},{"vulnerability":"VCID-5rak-8wp8-hqcm"},{"vulnerability":"VCID-66e8-kf7g-2bcv"},{"vulnerability":"VCID-6cjq-sz9f-mqf9"},{"vulnerability":"VCID-6kvf-hsu3-nfc3"},{"vulnerability":"VCID-6v51-g3b9-3qbf"},{"vulnerability":"VCID-7sc8-fzw3-vfer"},{"vulnerability":"VCID-7vbm-bp51-4faa"},{"vulnerability":"VCID-84t7-666n-fydn"},{"vulnerability":"VCID-88yz-vyfa-xuec"},{"vulnerability":"VCID-8p5q-y7th-e7a3"},{"vulnerability":"VCID-9v6f-mzak-87d6"},{"vulnerability":"VCID-a6f4-kkt1-yugs"},{"vulnerability":"VCID-b7k7-s2rd-j3h1"},{"vulnerability":"VCID-bmef-m4dw-kbeu"},{"vulnerability":"VCID-by8y-uamt-f7bt"},{"vulnerability":"VCID-cjbb-xm4r-c3b5"},{"vulnerability":"VCID-cxp6-cmpk-7uff"},{"vulnerability":"VCID-dfhw-bvdv-4udd"},{"vulnerability":"VCID-e8f4-9g99-6yet"},{"vulnerability":"VCID-ek5t-65by-syac"},{"vulnerability":"VCID-f47d-fm3y-q3b9"},{"vulnerability":"VCID-ftkb-qtse-afhq"},{"vulnerability":"VCID-fx6h-7q2k-5fd2"},{"vulnerability":"VCID-hd32-zxxu-6bh4"},{"vulnerability":"VCID-hsyc-q23j-2ua3"},{"vulnerability":"VCID-j49e-hexk-7kgd"},{"vulnerability":"VCID-jm7b-4gnb-uygv"},{"vulnerability":"VCID-k4nr-2da1-jke3"},{"vulnerability":"VCID-k6ey-kdwp-17ed"},{"vulnerability":"VCID-kh2b-vdkt-nkep"},{"vulnerability":"VCID-kvn8-qddz-vqag"},{"vulnerability":"VCID-mtb5-2vq5-4yf7"},{"vulnerability":"VCID-pejn-n3rz-33bs"},{"vulnerability":"VCID-pjtw-r398-uqgw"},{"vulnerability":"VCID-pkej-frsd-gqdk"},{"vulnerability":"VCID-q1nv-rtqz-4fhk"},{"vulnerability":"VCID-r1u7-ujc5-g7aw"},{"vulnerability":"VCID-rcs3-znj9-pbb8"},{"vulnerability":"VCID-rcxk-qvqu-y3fj"},{"vulnerability":"VCID-sdx4-5wtj-hbf9"},{"vulnerability":"VCID-syyt-ureu-23h8"},{"vulnerability":"VCID-t9qr-esv2-g7he"},{"vulnerability":"VCID-tcc9-936c-vkhk"},{"vulnerability":"VCID-tmj2-8abu-fuen"},{"vulnerability":"VCID-ugns-tvmf-e7c7"},{"vulnerability":"VCID-uqym-35ay-uua8"},{"vulnerability":"VCID-uv5p-15z7-fqcn"},{"vulnerability":"VCID-vcgu-7pzk-2udx"},{"vulnerability":"VCID-vj46-k8jn-a7ew"},{"vulnerability":"VCID-vjrz-ss5c-skcc"},{"vulnerability":"VCID-vwk2-2pwb-muhu"},{"vulnerability":"VCID-wj3y-5jmt-7ugw"},{"vulnerability":"VCID-x3kv-wwqy-8bav"},{"vulnerability":"VCID-xdh7-9hu5-vfa6"},{"vulnerability":"VCID-y2a1-fczv-k7e2"},{"vulnerability":"VCID-ycgk-1xz6-h3fm"},{"vulnerability":"VCID-z1d7-yjdv-hyh8"},{"vulnerability":"VCID-znqk-35mz-dqfk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2"}],"aliases":["CVE-2021-20294"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2"}