CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
266 results Clear all
CVE-2025-69652 6.2 MEDIUM EPSS 0.00
GNU Binutils <=2.46 - DoS
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
CWE-460 Mar 06, 2026
CVE-2025-69650 7.5 HIGH EPSS 0.00
GNU Binutils <=2.46 - Double Free
GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service.
CWE-415 Mar 06, 2026
CVE-2025-69649 7.5 HIGH EPSS 0.00
GNU Binutils thru 2.46 - DoS
GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed.
CWE-476 Mar 06, 2026
CVE-2025-69651 5.5 MEDIUM EPSS 0.00
GNU Binutils thru 2.46 - Memory Corruption
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service.
CWE-476 Mar 06, 2026
CVE-2025-69644 5.0 MEDIUM EPSS 0.00
Binutils <2.46 - DoS
An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file.
CWE-400 Mar 06, 2026
CVE-2025-66866 7.5 HIGH 1 Writeup EPSS 0.00
BinUtils <2.26 - DoS
An issue was discovered in function d_abi_tags in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CWE-20 Dec 29, 2025
CVE-2025-66865 7.5 HIGH 1 Writeup EPSS 0.00
BinUtils <2.26 - DoS
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CWE-121 Dec 29, 2025
CVE-2025-66864 7.5 HIGH 1 Writeup EPSS 0.00
BinUtils <2.26 - DoS
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CWE-20 Dec 29, 2025
CVE-2025-66863 7.5 HIGH 1 Writeup EPSS 0.00
BinUtils <2.26 - DoS
An issue was discovered in function d_discriminator in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CWE-400 Dec 29, 2025
CVE-2025-66862 7.5 HIGH 1 Writeup EPSS 0.00
BinUtils <2.26 - Buffer Overflow
A buffer overflow vulnerability in function gnu_special in file cplus-dem.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CWE-122 Dec 29, 2025
CVE-2025-66861 2.5 LOW 1 Writeup EPSS 0.00
BinUtils <2.26 - DoS
An issue was discovered in function d_unqualified_name in file cp-demangle.c in BinUtils 2.26 allowing attackers to cause a denial of service via crafted PE file.
CWE-400 Dec 29, 2025
CVE-2025-11840 3.3 LOW EPSS 0.00
GNU Binutils - Memory Corruption
A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing a manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. This patch is called 16357. It is best practice to apply a patch to resolve this issue.
CWE-125 Oct 16, 2025
CVE-2025-11839 3.3 LOW EPSS 0.00
GNU Binutils <2.45 - Unchecked Return Value
A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing a manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks.
CWE-253 Oct 16, 2025
CVE-2025-11495 3.3 LOW EPSS 0.00
GNU Binutils - Memory Corruption
A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
CWE-119 Oct 08, 2025
CVE-2025-11494 3.3 LOW EPSS 0.00
GNU Binutils - Memory Corruption
A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.
CWE-119 Oct 08, 2025
CVE-2025-11414 3.3 LOW EPSS 0.00
GNU Binutils <2.46 - Out-of-bounds Read
A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
CWE-119 Oct 07, 2025
CVE-2025-11413 3.3 LOW EPSS 0.00
GNU Binutils <2.46 - Out-of-bounds Read
A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
CWE-125 Oct 07, 2025
CVE-2025-11412 3.3 LOW EPSS 0.00
GNU Binutils <2.45 - Out-of-bounds Read
A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.
CWE-119 Oct 07, 2025
CVE-2025-11083 5.3 MEDIUM EPSS 0.00
GNU Binutils <2.45 - Buffer Overflow
A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
CWE-119 Sep 27, 2025
CVE-2025-11082 5.3 MEDIUM EPSS 0.00
GNU Binutils <2.45 - Buffer Overflow
A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".
CWE-119 Sep 27, 2025