{"uuid": "6a5d51aa-c54f-4e03-b396-fa97dbfcf8c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5244", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17633", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5244\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.\n\ud83d\udccf Published: 2025-05-27T13:00:14.904Z\n\ud83d\udccf Modified: 2025-05-27T13:32:03.140Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.310346\n2. https://vuldb.com/?ctiid.310346\n3. https://vuldb.com/?submit.584634\n4. https://sourceware.org/bugzilla/show_bug.cgi?id=32858\n5. https://sourceware.org/bugzilla/attachment.cgi?id=16010\n6. https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5\n7. https://www.gnu.org/", "creation_timestamp": "2025-05-27T13:48:24.000000Z"}