Vulnerability Database

309,364

Total vulnerabilities in the database

CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

  • Published: May 27, 2025
  • Updated: Nov 16, 2025
  • CVE: CVE-2025-5278
  • Severity: Low
  • Exploit:

CVSS v3:

  • Severity: Low
  • Score: 4.4
  • AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CWEs: