Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/binutils@2.31.1-14
Typedeb
Namespacedebian
Namebinutils
Version2.31.1-14
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.43.1-5
Latest_non_vulnerable_version2.45.50.20251125-1
Affected_by_vulnerabilities
0
url VCID-24yc-9zfd-skax
vulnerability_id VCID-24yc-9zfd-skax
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19932
reference_id
reference_type
scores
0
value 0.0042
scoring_system epss
scoring_elements 0.61829
published_at 2026-04-01T12:55:00Z
1
value 0.0042
scoring_system epss
scoring_elements 0.61986
published_at 2026-04-21T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.62
published_at 2026-04-16T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.62005
published_at 2026-04-18T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-07T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.61932
published_at 2026-04-04T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.61951
published_at 2026-04-08T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.61969
published_at 2026-04-09T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.6199
published_at 2026-04-11T12:55:00Z
9
value 0.0042
scoring_system epss
scoring_elements 0.61979
published_at 2026-04-12T12:55:00Z
10
value 0.0042
scoring_system epss
scoring_elements 0.61958
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1658949
reference_id 1658949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1658949
5
reference_url https://security.archlinux.org/ASA-201906-3
reference_id ASA-201906-3
reference_type
scores
url https://security.archlinux.org/ASA-201906-3
6
reference_url https://security.archlinux.org/AVG-832
reference_id AVG-832
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-832
7
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
8
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-19932
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax
1
url VCID-355u-uwc8-kfap
vulnerability_id VCID-355u-uwc8-kfap
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9070
reference_id
reference_type
scores
0
value 0.00451
scoring_system epss
scoring_elements 0.63618
published_at 2026-04-01T12:55:00Z
1
value 0.00451
scoring_system epss
scoring_elements 0.63729
published_at 2026-04-21T12:55:00Z
2
value 0.00451
scoring_system epss
scoring_elements 0.63733
published_at 2026-04-16T12:55:00Z
3
value 0.00451
scoring_system epss
scoring_elements 0.63743
published_at 2026-04-18T12:55:00Z
4
value 0.00451
scoring_system epss
scoring_elements 0.63677
published_at 2026-04-02T12:55:00Z
5
value 0.00451
scoring_system epss
scoring_elements 0.63703
published_at 2026-04-04T12:55:00Z
6
value 0.00451
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-07T12:55:00Z
7
value 0.00451
scoring_system epss
scoring_elements 0.63715
published_at 2026-04-08T12:55:00Z
8
value 0.00451
scoring_system epss
scoring_elements 0.63732
published_at 2026-04-12T12:55:00Z
9
value 0.00451
scoring_system epss
scoring_elements 0.63746
published_at 2026-04-11T12:55:00Z
10
value 0.00451
scoring_system epss
scoring_elements 0.63698
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9070
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
3
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24229
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24229
6
reference_url https://support.f5.com/csp/article/K13534168
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K13534168
7
reference_url http://www.securityfocus.com/bid/107147
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107147
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680651
reference_id 1680651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680651
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9070
reference_id CVE-2019-9070
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9070
15
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
16
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9070
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-355u-uwc8-kfap
2
url VCID-364t-fc6u-w7h4
vulnerability_id VCID-364t-fc6u-w7h4
summary binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12934
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71963
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-21T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.72009
published_at 2026-04-13T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-16T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.72058
published_at 2026-04-18T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.7197
published_at 2026-04-02T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.7199
published_at 2026-04-04T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-07T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72005
published_at 2026-04-08T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.72017
published_at 2026-04-09T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.7204
published_at 2026-04-11T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.72024
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12934
2
reference_url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23059
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23059
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1597853
reference_id 1597853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1597853
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12934
reference_id CVE-2018-12934
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12934
10
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
11
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
12
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-12934
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-364t-fc6u-w7h4
3
url VCID-3v94-m5uz-kyg5
vulnerability_id VCID-3v94-m5uz-kyg5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35507
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42713
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42616
published_at 2026-04-01T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42686
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45691
published_at 2026-04-11T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45661
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.4572
published_at 2026-04-16T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-18T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45664
published_at 2026-04-21T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-07T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45673
published_at 2026-04-08T12:55:00Z
10
value 0.00229
scoring_system epss
scoring_elements 0.45669
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911691
reference_id 1911691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911691
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35507
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v94-m5uz-kyg5
4
url VCID-42yc-u5rt-tua5
vulnerability_id VCID-42yc-u5rt-tua5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12697
reference_id
reference_type
scores
0
value 0.01561
scoring_system epss
scoring_elements 0.81416
published_at 2026-04-01T12:55:00Z
1
value 0.01561
scoring_system epss
scoring_elements 0.8152
published_at 2026-04-21T12:55:00Z
2
value 0.01561
scoring_system epss
scoring_elements 0.8148
published_at 2026-04-13T12:55:00Z
3
value 0.01561
scoring_system epss
scoring_elements 0.81517
published_at 2026-04-16T12:55:00Z
4
value 0.01561
scoring_system epss
scoring_elements 0.81518
published_at 2026-04-18T12:55:00Z
5
value 0.01561
scoring_system epss
scoring_elements 0.81425
published_at 2026-04-02T12:55:00Z
6
value 0.01561
scoring_system epss
scoring_elements 0.81447
published_at 2026-04-04T12:55:00Z
7
value 0.01561
scoring_system epss
scoring_elements 0.81445
published_at 2026-04-07T12:55:00Z
8
value 0.01561
scoring_system epss
scoring_elements 0.81473
published_at 2026-04-08T12:55:00Z
9
value 0.01561
scoring_system epss
scoring_elements 0.81478
published_at 2026-04-09T12:55:00Z
10
value 0.01561
scoring_system epss
scoring_elements 0.815
published_at 2026-04-11T12:55:00Z
11
value 0.01561
scoring_system epss
scoring_elements 0.81487
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12697
2
reference_url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
7
reference_url http://www.securityfocus.com/bid/104538
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104538
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1595417
reference_id 1595417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1595417
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12697
reference_id CVE-2018-12697
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12697
12
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
13
reference_url https://access.redhat.com/errata/RHSA-2019:2075
reference_id RHSA-2019:2075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2075
14
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
15
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
16
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-12697
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42yc-u5rt-tua5
5
url VCID-4adx-y65a-v7b8
vulnerability_id VCID-4adx-y65a-v7b8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12972
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69648
published_at 2026-04-21T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69647
published_at 2026-04-11T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69632
published_at 2026-04-12T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69618
published_at 2026-04-13T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69658
published_at 2026-04-16T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69667
published_at 2026-04-18T12:55:00Z
6
value 0.00617
scoring_system epss
scoring_elements 0.69888
published_at 2026-04-02T12:55:00Z
7
value 0.00617
scoring_system epss
scoring_elements 0.69876
published_at 2026-04-01T12:55:00Z
8
value 0.00617
scoring_system epss
scoring_elements 0.69928
published_at 2026-04-08T12:55:00Z
9
value 0.00617
scoring_system epss
scoring_elements 0.69945
published_at 2026-04-09T12:55:00Z
10
value 0.00617
scoring_system epss
scoring_elements 0.69903
published_at 2026-04-04T12:55:00Z
11
value 0.00617
scoring_system epss
scoring_elements 0.6988
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1831873
reference_id 1831873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1831873
5
reference_url https://security.gentoo.org/glsa/202007-39
reference_id GLSA-202007-39
reference_type
scores
url https://security.gentoo.org/glsa/202007-39
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-12972
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4adx-y65a-v7b8
6
url VCID-4wvj-4tta-euhv
vulnerability_id VCID-4wvj-4tta-euhv
summary binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18606
reference_id
reference_type
scores
0
value 0.00678
scoring_system epss
scoring_elements 0.71473
published_at 2026-04-01T12:55:00Z
1
value 0.00678
scoring_system epss
scoring_elements 0.7148
published_at 2026-04-02T12:55:00Z
2
value 0.00678
scoring_system epss
scoring_elements 0.71497
published_at 2026-04-04T12:55:00Z
3
value 0.00678
scoring_system epss
scoring_elements 0.7147
published_at 2026-04-07T12:55:00Z
4
value 0.00678
scoring_system epss
scoring_elements 0.71511
published_at 2026-04-08T12:55:00Z
5
value 0.00678
scoring_system epss
scoring_elements 0.71523
published_at 2026-04-09T12:55:00Z
6
value 0.00678
scoring_system epss
scoring_elements 0.71545
published_at 2026-04-11T12:55:00Z
7
value 0.00678
scoring_system epss
scoring_elements 0.7153
published_at 2026-04-12T12:55:00Z
8
value 0.00678
scoring_system epss
scoring_elements 0.71512
published_at 2026-04-13T12:55:00Z
9
value 0.00678
scoring_system epss
scoring_elements 0.71558
published_at 2026-04-16T12:55:00Z
10
value 0.00678
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-18T12:55:00Z
11
value 0.00678
scoring_system epss
scoring_elements 0.71542
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647415
reference_id 1647415
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647415
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18606
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wvj-4tta-euhv
7
url VCID-52jz-yyum-7qcw
vulnerability_id VCID-52jz-yyum-7qcw
summary binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16599
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22217
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22385
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.2243
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22218
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22301
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22356
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22376
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22335
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22275
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.2228
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22274
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906762
reference_id 1906762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906762
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-16599
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52jz-yyum-7qcw
8
url VCID-5fwg-b16u-cybk
vulnerability_id VCID-5fwg-b16u-cybk
summary binutils: memory leak in get_field() in microblaze-dis.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-21490
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06316
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06153
published_at 2026-04-16T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06164
published_at 2026-04-18T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06089
published_at 2026-04-01T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06152
published_at 2026-04-04T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06136
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06178
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06216
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06208
published_at 2026-04-11T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06203
published_at 2026-04-12T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06194
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-21490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233943
reference_id 2233943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233943
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907
5
reference_url https://security.netapp.com/advisory/ntap-20230929-0007/
reference_id ntap-20230929-0007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/
url https://security.netapp.com/advisory/ntap-20230929-0007/
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25249
reference_id show_bug.cgi?id=25249
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=25249
7
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-21490
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwg-b16u-cybk
9
url VCID-74th-5s6d-5fb9
vulnerability_id VCID-74th-5s6d-5fb9
summary
A buffer overflow in gdb might allow a remote attacker to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1010180
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52703
published_at 2026-04-21T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52673
published_at 2026-04-13T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52712
published_at 2026-04-16T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-18T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53988
published_at 2026-04-04T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54015
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54062
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54043
published_at 2026-04-12T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.53943
published_at 2026-04-01T12:55:00Z
9
value 0.00308
scoring_system epss
scoring_elements 0.53964
published_at 2026-04-07T12:55:00Z
10
value 0.00308
scoring_system epss
scoring_elements 0.53961
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1010180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1740615
reference_id 1740615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1740615
5
reference_url https://security.gentoo.org/glsa/202003-31
reference_id GLSA-202003-31
reference_type
scores
url https://security.gentoo.org/glsa/202003-31
6
reference_url https://access.redhat.com/errata/RHSA-2020:1635
reference_id RHSA-2020:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1635
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-1010180
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74th-5s6d-5fb9
10
url VCID-858u-d8cb-m3ca
vulnerability_id VCID-858u-d8cb-m3ca
summary binutils: Stack exhaustion in cp-demangle.c allows for denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18484
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35683
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.3588
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.3591
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35791
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35814
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35822
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35782
published_at 2026-04-12T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39133
published_at 2026-04-21T12:55:00Z
9
value 0.00177
scoring_system epss
scoring_elements 0.39198
published_at 2026-04-13T12:55:00Z
10
value 0.00177
scoring_system epss
scoring_elements 0.39252
published_at 2026-04-16T12:55:00Z
11
value 0.00177
scoring_system epss
scoring_elements 0.39222
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1645958
reference_id 1645958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1645958
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18484
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-858u-d8cb-m3ca
11
url VCID-8k17-exgp-8kb6
vulnerability_id VCID-8k17-exgp-8kb6
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35496
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42713
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42616
published_at 2026-04-01T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42686
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45691
published_at 2026-04-11T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45661
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.4572
published_at 2026-04-16T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-18T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45664
published_at 2026-04-21T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-07T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45673
published_at 2026-04-08T12:55:00Z
10
value 0.00229
scoring_system epss
scoring_elements 0.45669
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911444
reference_id 1911444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911444
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35496
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k17-exgp-8kb6
12
url VCID-9zeg-2c76-nydc
vulnerability_id VCID-9zeg-2c76-nydc
summary binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18701
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56159
published_at 2026-04-21T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56154
published_at 2026-04-13T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56187
published_at 2026-04-16T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56189
published_at 2026-04-18T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
11
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18701
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646529
reference_id 1646529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646529
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18701
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zeg-2c76-nydc
13
url VCID-a9f1-agdt-2udp
vulnerability_id VCID-a9f1-agdt-2udp
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17451
reference_id
reference_type
scores
0
value 0.00741
scoring_system epss
scoring_elements 0.72891
published_at 2026-04-01T12:55:00Z
1
value 0.00741
scoring_system epss
scoring_elements 0.72991
published_at 2026-04-21T12:55:00Z
2
value 0.00741
scoring_system epss
scoring_elements 0.72947
published_at 2026-04-13T12:55:00Z
3
value 0.00741
scoring_system epss
scoring_elements 0.72988
published_at 2026-04-16T12:55:00Z
4
value 0.00741
scoring_system epss
scoring_elements 0.72998
published_at 2026-04-18T12:55:00Z
5
value 0.00741
scoring_system epss
scoring_elements 0.72899
published_at 2026-04-02T12:55:00Z
6
value 0.00741
scoring_system epss
scoring_elements 0.7292
published_at 2026-04-04T12:55:00Z
7
value 0.00741
scoring_system epss
scoring_elements 0.72895
published_at 2026-04-07T12:55:00Z
8
value 0.00741
scoring_system epss
scoring_elements 0.72933
published_at 2026-04-08T12:55:00Z
9
value 0.00741
scoring_system epss
scoring_elements 0.72946
published_at 2026-04-09T12:55:00Z
10
value 0.00741
scoring_system epss
scoring_elements 0.72971
published_at 2026-04-11T12:55:00Z
11
value 0.00741
scoring_system epss
scoring_elements 0.72953
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17451
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20191024-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191024-0002/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25070
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=25070
8
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1771668
reference_id 1771668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1771668
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17451
reference_id CVE-2019-17451
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17451
15
reference_url https://security.gentoo.org/glsa/202007-39
reference_id GLSA-202007-39
reference_type
scores
url https://security.gentoo.org/glsa/202007-39
16
reference_url https://access.redhat.com/errata/RHSA-2020:1797
reference_id RHSA-2020:1797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1797
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-17451
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9f1-agdt-2udp
14
url VCID-ac8t-y71t-mub4
vulnerability_id VCID-ac8t-y71t-mub4
summary binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18605
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61743
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61817
published_at 2026-04-07T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61847
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61866
published_at 2026-04-08T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61882
published_at 2026-04-09T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61903
published_at 2026-04-11T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61892
published_at 2026-04-12T12:55:00Z
7
value 0.00687
scoring_system epss
scoring_elements 0.71743
published_at 2026-04-21T12:55:00Z
8
value 0.00687
scoring_system epss
scoring_elements 0.71711
published_at 2026-04-13T12:55:00Z
9
value 0.00687
scoring_system epss
scoring_elements 0.71755
published_at 2026-04-16T12:55:00Z
10
value 0.00687
scoring_system epss
scoring_elements 0.71761
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647403
reference_id 1647403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647403
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18605
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac8t-y71t-mub4
15
url VCID-awj8-tc5z-8qdc
vulnerability_id VCID-awj8-tc5z-8qdc
summary binutils: double free vulnerability in process_symbol_table could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16590
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-21T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-12T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54912
published_at 2026-04-13T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.5495
published_at 2026-04-16T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54953
published_at 2026-04-18T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54892
published_at 2026-04-07T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54942
published_at 2026-04-08T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54941
published_at 2026-04-09T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54954
published_at 2026-04-11T12:55:00Z
9
value 0.00333
scoring_system epss
scoring_elements 0.56142
published_at 2026-04-02T12:55:00Z
10
value 0.00333
scoring_system epss
scoring_elements 0.56162
published_at 2026-04-04T12:55:00Z
11
value 0.00333
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906782
reference_id 1906782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906782
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-16590
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awj8-tc5z-8qdc
16
url VCID-awuy-3kcy-zyev
vulnerability_id VCID-awuy-3kcy-zyev
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9074
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25059
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-21T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24999
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-18T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25142
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25182
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25067
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25082
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.25041
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9074
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24235
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24235
8
reference_url https://support.f5.com/csp/article/K09092524
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K09092524
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680665
reference_id 1680665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680665
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9074
reference_id CVE-2019-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9074
15
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
16
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
17
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9074
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awuy-3kcy-zyev
17
url VCID-bz7s-dtce-e3bb
vulnerability_id VCID-bz7s-dtce-e3bb
summary binutils: Use-after-free in the error function
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20623
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.5544
published_at 2026-04-04T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55415
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.5546
published_at 2026-04-21T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55481
published_at 2026-04-18T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55478
published_at 2026-04-16T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-13T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55459
published_at 2026-04-12T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.5548
published_at 2026-04-11T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55471
published_at 2026-04-09T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.5547
published_at 2026-04-08T12:55:00Z
10
value 0.00324
scoring_system epss
scoring_elements 0.55419
published_at 2026-04-07T12:55:00Z
11
value 0.00324
scoring_system epss
scoring_elements 0.55302
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24049
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=24049
7
reference_url https://support.f5.com/csp/article/K38336243
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url https://support.f5.com/csp/article/K38336243
8
reference_url http://www.securityfocus.com/bid/106370
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url http://www.securityfocus.com/bid/106370
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664700
reference_id 1664700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664700
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20623
reference_id CVE-2018-20623
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20623
12
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/
url https://usn.ubuntu.com/4336-1/
13
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-20623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz7s-dtce-e3bb
18
url VCID-ckh9-wqe3-euhu
vulnerability_id VCID-ckh9-wqe3-euhu
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35493
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42855
published_at 2026-04-21T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.4292
published_at 2026-04-11T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42868
published_at 2026-04-13T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42929
published_at 2026-04-16T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42917
published_at 2026-04-18T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42835
published_at 2026-04-07T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42885
published_at 2026-04-12T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42898
published_at 2026-04-09T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45503
published_at 2026-04-02T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45525
published_at 2026-04-04T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45428
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911437
reference_id 1911437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911437
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35493
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckh9-wqe3-euhu
19
url VCID-e98q-uqeq-g7ef
vulnerability_id VCID-e98q-uqeq-g7ef
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12698
reference_id
reference_type
scores
0
value 0.01892
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-01T12:55:00Z
1
value 0.01892
scoring_system epss
scoring_elements 0.83182
published_at 2026-04-08T12:55:00Z
2
value 0.01892
scoring_system epss
scoring_elements 0.83199
published_at 2026-04-12T12:55:00Z
3
value 0.01892
scoring_system epss
scoring_elements 0.83195
published_at 2026-04-13T12:55:00Z
4
value 0.01892
scoring_system epss
scoring_elements 0.83231
published_at 2026-04-16T12:55:00Z
5
value 0.01892
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-18T12:55:00Z
6
value 0.01892
scoring_system epss
scoring_elements 0.83145
published_at 2026-04-02T12:55:00Z
7
value 0.01892
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-04T12:55:00Z
8
value 0.01892
scoring_system epss
scoring_elements 0.83157
published_at 2026-04-07T12:55:00Z
9
value 0.01892
scoring_system epss
scoring_elements 0.83189
published_at 2026-04-09T12:55:00Z
10
value 0.01892
scoring_system epss
scoring_elements 0.83205
published_at 2026-04-11T12:55:00Z
11
value 0.0204
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12698
2
reference_url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
7
reference_url http://www.securityfocus.com/bid/104539
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104539
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1595419
reference_id 1595419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1595419
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12698
reference_id CVE-2018-12698
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12698
12
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
13
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
14
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
15
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-12698
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e98q-uqeq-g7ef
20
url VCID-edt6-dqcw-duea
vulnerability_id VCID-edt6-dqcw-duea
summary binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18483
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.4849
published_at 2026-04-01T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48526
published_at 2026-04-02T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48548
published_at 2026-04-04T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.485
published_at 2026-04-07T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48555
published_at 2026-04-08T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.4855
published_at 2026-04-09T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48571
published_at 2026-04-11T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48544
published_at 2026-04-12T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64073
published_at 2026-04-21T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.6404
published_at 2026-04-13T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64075
published_at 2026-04-16T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64086
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1645957
reference_id 1645957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1645957
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18483
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edt6-dqcw-duea
21
url VCID-et14-hrds-qbf5
vulnerability_id VCID-et14-hrds-qbf5
summary binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17794
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.6394
published_at 2026-04-01T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.63998
published_at 2026-04-02T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64026
published_at 2026-04-04T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.63986
published_at 2026-04-07T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.64036
published_at 2026-04-08T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64053
published_at 2026-04-09T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64064
published_at 2026-04-11T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64051
published_at 2026-04-12T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64021
published_at 2026-04-13T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.64056
published_at 2026-04-16T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64067
published_at 2026-04-18T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64055
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1635082
reference_id 1635082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1635082
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-17794
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et14-hrds-qbf5
22
url VCID-g97f-4w1h-uud8
vulnerability_id VCID-g97f-4w1h-uud8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12699
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66669
published_at 2026-04-01T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66709
published_at 2026-04-02T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66736
published_at 2026-04-04T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66708
published_at 2026-04-07T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66757
published_at 2026-04-08T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66772
published_at 2026-04-09T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.66792
published_at 2026-04-11T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66778
published_at 2026-04-12T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.67813
published_at 2026-04-16T12:55:00Z
9
value 0.00545
scoring_system epss
scoring_elements 0.67826
published_at 2026-04-18T12:55:00Z
10
value 0.00545
scoring_system epss
scoring_elements 0.67777
published_at 2026-04-13T12:55:00Z
11
value 0.00588
scoring_system epss
scoring_elements 0.69165
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12699
2
reference_url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23057
7
reference_url http://www.securityfocus.com/bid/104540
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104540
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1595427
reference_id 1595427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1595427
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12699
reference_id CVE-2018-12699
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12699
12
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
13
reference_url https://access.redhat.com/errata/RHSA-2024:9689
reference_id RHSA-2024:9689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9689
14
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
15
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-12699
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g97f-4w1h-uud8
23
url VCID-gmsc-hu9c-9ybb
vulnerability_id VCID-gmsc-hu9c-9ybb
summary binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17358
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-01T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63463
published_at 2026-04-02T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.6349
published_at 2026-04-13T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63455
published_at 2026-04-07T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.63506
published_at 2026-04-08T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63523
published_at 2026-04-09T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.6354
published_at 2026-04-11T12:55:00Z
7
value 0.00447
scoring_system epss
scoring_elements 0.63524
published_at 2026-04-12T12:55:00Z
8
value 0.00447
scoring_system epss
scoring_elements 0.63526
published_at 2026-04-16T12:55:00Z
9
value 0.00447
scoring_system epss
scoring_elements 0.63533
published_at 2026-04-18T12:55:00Z
10
value 0.00447
scoring_system epss
scoring_elements 0.63518
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1632908
reference_id 1632908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1632908
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-17358
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsc-hu9c-9ybb
24
url VCID-gws5-9vy4-vqa1
vulnerability_id VCID-gws5-9vy4-vqa1
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9075
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50743
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50864
published_at 2026-04-21T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50857
published_at 2026-04-12T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50841
published_at 2026-04-13T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50885
published_at 2026-04-18T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.508
published_at 2026-04-02T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50825
published_at 2026-04-04T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50783
published_at 2026-04-07T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50839
published_at 2026-04-08T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50838
published_at 2026-04-09T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50879
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24236
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24236
8
reference_url https://support.f5.com/csp/article/K42059040
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K42059040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680669
reference_id 1680669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680669
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9075
reference_id CVE-2019-9075
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9075
41
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
42
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
43
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9075
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gws5-9vy4-vqa1
25
url VCID-hbpa-49pk-67dy
vulnerability_id VCID-hbpa-49pk-67dy
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35494
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29847
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29892
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.2994
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29752
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29814
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29858
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29812
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29762
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29781
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29716
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911439
reference_id 1911439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911439
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35494
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbpa-49pk-67dy
26
url VCID-jrbf-3aut-e7ey
vulnerability_id VCID-jrbf-3aut-e7ey
summary binutils: memory leak in get_data() in nm.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-19724
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05172
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05216
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05366
published_at 2026-04-21T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-13T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05211
published_at 2026-04-16T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05212
published_at 2026-04-18T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05247
published_at 2026-04-04T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05271
published_at 2026-04-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05306
published_at 2026-04-08T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05328
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05293
published_at 2026-04-11T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05279
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-19724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233930
reference_id 2233930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233930
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a
reference_id gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25362
reference_id show_bug.cgi?id=25362
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=25362
7
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-19724
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrbf-3aut-e7ey
27
url VCID-jz8y-4wcy-6yhc
vulnerability_id VCID-jz8y-4wcy-6yhc
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14250
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40809
published_at 2026-04-01T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-02T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40919
published_at 2026-04-04T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40847
published_at 2026-04-07T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40896
published_at 2026-04-08T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40903
published_at 2026-04-09T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.4092
published_at 2026-04-11T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40884
published_at 2026-04-12T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40865
published_at 2026-04-13T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40907
published_at 2026-04-16T12:55:00Z
10
value 0.0019
scoring_system epss
scoring_elements 0.40877
published_at 2026-04-18T12:55:00Z
11
value 0.0019
scoring_system epss
scoring_elements 0.40798
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1739490
reference_id 1739490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1739490
5
reference_url https://security.gentoo.org/glsa/202007-39
reference_id GLSA-202007-39
reference_type
scores
url https://security.gentoo.org/glsa/202007-39
6
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
7
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-14250
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8y-4wcy-6yhc
28
url VCID-k6fk-apzd-v7b6
vulnerability_id VCID-k6fk-apzd-v7b6
summary binutils: invalid read in process_symbol_table could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16591
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59248
published_at 2026-04-21T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59261
published_at 2026-04-16T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59243
published_at 2026-04-12T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59224
published_at 2026-04-13T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59266
published_at 2026-04-18T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59176
published_at 2026-04-07T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59228
published_at 2026-04-08T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-09T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60241
published_at 2026-04-02T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60267
published_at 2026-04-04T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60164
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16591
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906771
reference_id 1906771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906771
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-16591
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6fk-apzd-v7b6
29
url VCID-kuzy-t7d8-kfhd
vulnerability_id VCID-kuzy-t7d8-kfhd
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19931
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55027
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.55173
published_at 2026-04-21T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.5519
published_at 2026-04-16T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55194
published_at 2026-04-18T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55128
published_at 2026-04-02T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55152
published_at 2026-04-04T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55127
published_at 2026-04-07T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55177
published_at 2026-04-09T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55188
published_at 2026-04-11T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55169
published_at 2026-04-12T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55151
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19931
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1658947
reference_id 1658947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1658947
5
reference_url https://security.archlinux.org/ASA-201906-3
reference_id ASA-201906-3
reference_type
scores
url https://security.archlinux.org/ASA-201906-3
6
reference_url https://security.archlinux.org/AVG-832
reference_id AVG-832
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-832
7
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
8
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-19931
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd
30
url VCID-mz6k-cg6z-d3ct
vulnerability_id VCID-mz6k-cg6z-d3ct
summary binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-9138
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53315
published_at 2026-04-01T12:55:00Z
1
value 0.00301
scoring_system epss
scoring_elements 0.53339
published_at 2026-04-02T12:55:00Z
2
value 0.00301
scoring_system epss
scoring_elements 0.53365
published_at 2026-04-04T12:55:00Z
3
value 0.00301
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-07T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53386
published_at 2026-04-08T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53381
published_at 2026-04-09T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53433
published_at 2026-04-11T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53417
published_at 2026-04-12T12:55:00Z
8
value 0.00301
scoring_system epss
scoring_elements 0.534
published_at 2026-04-13T12:55:00Z
9
value 0.00301
scoring_system epss
scoring_elements 0.53438
published_at 2026-04-16T12:55:00Z
10
value 0.00301
scoring_system epss
scoring_elements 0.53443
published_at 2026-04-18T12:55:00Z
11
value 0.00301
scoring_system epss
scoring_elements 0.53423
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-9138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1564291
reference_id 1564291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1564291
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-9138
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz6k-cg6z-d3ct
31
url VCID-pwzu-d55f-nqb5
vulnerability_id VCID-pwzu-d55f-nqb5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9077
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52666
published_at 2026-04-01T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52794
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52766
published_at 2026-04-13T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52804
published_at 2026-04-16T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52811
published_at 2026-04-18T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52711
published_at 2026-04-02T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52737
published_at 2026-04-04T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52702
published_at 2026-04-07T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52753
published_at 2026-04-08T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52748
published_at 2026-04-09T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52799
published_at 2026-04-11T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.52782
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9077
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24243
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24243
8
reference_url https://support.f5.com/csp/article/K00056379
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K00056379
9
reference_url http://www.securityfocus.com/bid/107139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107139
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680675
reference_id 1680675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680675
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9077
reference_id CVE-2019-9077
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9077
16
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9077
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwzu-d55f-nqb5
32
url VCID-qz7m-rvgd-xkes
vulnerability_id VCID-qz7m-rvgd-xkes
summary binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16593
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54932
published_at 2026-04-21T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54935
published_at 2026-04-12T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54912
published_at 2026-04-13T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.5495
published_at 2026-04-16T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54953
published_at 2026-04-18T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54892
published_at 2026-04-07T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54942
published_at 2026-04-08T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54941
published_at 2026-04-09T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54954
published_at 2026-04-11T12:55:00Z
9
value 0.00333
scoring_system epss
scoring_elements 0.56142
published_at 2026-04-02T12:55:00Z
10
value 0.00333
scoring_system epss
scoring_elements 0.56162
published_at 2026-04-04T12:55:00Z
11
value 0.00333
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906772
reference_id 1906772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906772
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-16593
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz7m-rvgd-xkes
33
url VCID-r3e5-9gq6-zuer
vulnerability_id VCID-r3e5-9gq6-zuer
summary binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18700
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70216
published_at 2026-04-01T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.70229
published_at 2026-04-02T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70246
published_at 2026-04-04T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70223
published_at 2026-04-07T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70269
published_at 2026-04-08T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.70284
published_at 2026-04-09T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70308
published_at 2026-04-11T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70293
published_at 2026-04-12T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.7028
published_at 2026-04-13T12:55:00Z
9
value 0.0063
scoring_system epss
scoring_elements 0.70322
published_at 2026-04-16T12:55:00Z
10
value 0.0063
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-18T12:55:00Z
11
value 0.0063
scoring_system epss
scoring_elements 0.70313
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646535
reference_id 1646535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646535
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18700
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3e5-9gq6-zuer
34
url VCID-rwgp-drg3-2kbp
vulnerability_id VCID-rwgp-drg3-2kbp
summary binutils: invalid memory address dereference in read_reloc in reloc.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18309
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38892
published_at 2026-04-21T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38948
published_at 2026-04-13T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38995
published_at 2026-04-16T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38976
published_at 2026-04-18T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52733
published_at 2026-04-04T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.5275
published_at 2026-04-08T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52744
published_at 2026-04-09T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52795
published_at 2026-04-11T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52778
published_at 2026-04-12T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52662
published_at 2026-04-01T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52699
published_at 2026-04-07T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.52707
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1639911
reference_id 1639911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1639911
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18309
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rwgp-drg3-2kbp
35
url VCID-s43d-bcvr-8ka9
vulnerability_id VCID-s43d-bcvr-8ka9
summary binutils: use-after-free in bfd_hash_lookup could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16592
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55506
published_at 2026-04-21T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55504
published_at 2026-04-12T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55487
published_at 2026-04-13T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55524
published_at 2026-04-16T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55527
published_at 2026-04-18T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55464
published_at 2026-04-07T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55515
published_at 2026-04-08T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55516
published_at 2026-04-09T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55525
published_at 2026-04-11T12:55:00Z
9
value 0.00339
scoring_system epss
scoring_elements 0.56671
published_at 2026-04-02T12:55:00Z
10
value 0.00339
scoring_system epss
scoring_elements 0.56692
published_at 2026-04-04T12:55:00Z
11
value 0.00339
scoring_system epss
scoring_elements 0.56575
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906777
reference_id 1906777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906777
5
reference_url https://usn.ubuntu.com/5124-1/
reference_id USN-5124-1
reference_type
scores
url https://usn.ubuntu.com/5124-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-16592
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s43d-bcvr-8ka9
36
url VCID-sq8n-whxy-qkb2
vulnerability_id VCID-sq8n-whxy-qkb2
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20651
reference_id
reference_type
scores
0
value 0.0076
scoring_system epss
scoring_elements 0.73278
published_at 2026-04-01T12:55:00Z
1
value 0.0076
scoring_system epss
scoring_elements 0.73372
published_at 2026-04-21T12:55:00Z
2
value 0.0076
scoring_system epss
scoring_elements 0.73328
published_at 2026-04-13T12:55:00Z
3
value 0.0076
scoring_system epss
scoring_elements 0.73371
published_at 2026-04-16T12:55:00Z
4
value 0.0076
scoring_system epss
scoring_elements 0.73379
published_at 2026-04-18T12:55:00Z
5
value 0.0076
scoring_system epss
scoring_elements 0.73288
published_at 2026-04-02T12:55:00Z
6
value 0.0076
scoring_system epss
scoring_elements 0.73311
published_at 2026-04-04T12:55:00Z
7
value 0.0076
scoring_system epss
scoring_elements 0.73283
published_at 2026-04-07T12:55:00Z
8
value 0.0076
scoring_system epss
scoring_elements 0.73319
published_at 2026-04-08T12:55:00Z
9
value 0.0076
scoring_system epss
scoring_elements 0.73332
published_at 2026-04-09T12:55:00Z
10
value 0.0076
scoring_system epss
scoring_elements 0.73356
published_at 2026-04-11T12:55:00Z
11
value 0.0076
scoring_system epss
scoring_elements 0.73336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20651
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24041
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24041
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f
8
reference_url https://support.f5.com/csp/article/K38336243
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K38336243
9
reference_url http://www.securityfocus.com/bid/106440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106440
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664703
reference_id 1664703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664703
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20651
reference_id CVE-2018-20651
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20651
13
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
14
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-20651
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq8n-whxy-qkb2
37
url VCID-t3vb-dfc1-7bah
vulnerability_id VCID-t3vb-dfc1-7bah
summary binutils: Stack consumption problem caused by the cplus_demangle_type
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17985
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38702
published_at 2026-04-01T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.3884
published_at 2026-04-02T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38861
published_at 2026-04-04T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.3879
published_at 2026-04-07T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38842
published_at 2026-04-08T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38853
published_at 2026-04-09T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38866
published_at 2026-04-11T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38829
published_at 2026-04-12T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38802
published_at 2026-04-13T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38848
published_at 2026-04-16T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38826
published_at 2026-04-18T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38746
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652723
reference_id 1652723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652723
5
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-17985
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3vb-dfc1-7bah
38
url VCID-ta1q-eax9-hfcb
vulnerability_id VCID-ta1q-eax9-hfcb
summary binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18607
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.58896
published_at 2026-04-01T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.58971
published_at 2026-04-02T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.58994
published_at 2026-04-04T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.5896
published_at 2026-04-07T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.59011
published_at 2026-04-08T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59018
published_at 2026-04-12T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59037
published_at 2026-04-11T12:55:00Z
7
value 0.00678
scoring_system epss
scoring_elements 0.71542
published_at 2026-04-21T12:55:00Z
8
value 0.00678
scoring_system epss
scoring_elements 0.71512
published_at 2026-04-13T12:55:00Z
9
value 0.00678
scoring_system epss
scoring_elements 0.71558
published_at 2026-04-16T12:55:00Z
10
value 0.00678
scoring_system epss
scoring_elements 0.71563
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647421
reference_id 1647421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647421
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-18607
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ta1q-eax9-hfcb
39
url VCID-u1cw-5p72-a7f4
vulnerability_id VCID-u1cw-5p72-a7f4
summary binutils: integer overflow leads to heap-based buffer overflow in objdump
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000876
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-01T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.3285
published_at 2026-04-21T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32866
published_at 2026-04-13T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32906
published_at 2026-04-16T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32885
published_at 2026-04-18T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32992
published_at 2026-04-02T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.33027
published_at 2026-04-04T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32849
published_at 2026-04-07T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32896
published_at 2026-04-08T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32926
published_at 2026-04-09T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.3293
published_at 2026-04-11T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32892
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000876
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=23994
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=23994
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f
8
reference_url http://www.securityfocus.com/bid/106304
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106304
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664699
reference_id 1664699
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664699
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000876
reference_id CVE-2018-1000876
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000876
16
reference_url https://access.redhat.com/errata/RHSA-2019:2075
reference_id RHSA-2019:2075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2075
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-1000876
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1cw-5p72-a7f4
40
url VCID-ua83-5ewj-aqha
vulnerability_id VCID-ua83-5ewj-aqha
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17450
reference_id
reference_type
scores
0
value 0.01079
scoring_system epss
scoring_elements 0.7777
published_at 2026-04-01T12:55:00Z
1
value 0.01079
scoring_system epss
scoring_elements 0.77859
published_at 2026-04-21T12:55:00Z
2
value 0.01079
scoring_system epss
scoring_elements 0.7783
published_at 2026-04-13T12:55:00Z
3
value 0.01079
scoring_system epss
scoring_elements 0.77866
published_at 2026-04-16T12:55:00Z
4
value 0.01079
scoring_system epss
scoring_elements 0.77865
published_at 2026-04-18T12:55:00Z
5
value 0.01079
scoring_system epss
scoring_elements 0.77777
published_at 2026-04-02T12:55:00Z
6
value 0.01079
scoring_system epss
scoring_elements 0.77803
published_at 2026-04-04T12:55:00Z
7
value 0.01079
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-07T12:55:00Z
8
value 0.01079
scoring_system epss
scoring_elements 0.77814
published_at 2026-04-08T12:55:00Z
9
value 0.01079
scoring_system epss
scoring_elements 0.77819
published_at 2026-04-09T12:55:00Z
10
value 0.01079
scoring_system epss
scoring_elements 0.77846
published_at 2026-04-11T12:55:00Z
11
value 0.01079
scoring_system epss
scoring_elements 0.77831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17450
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20191024-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191024-0002/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25078
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=25078
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1771677
reference_id 1771677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1771677
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17450
reference_id CVE-2019-17450
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17450
14
reference_url https://security.gentoo.org/glsa/202007-39
reference_id GLSA-202007-39
reference_type
scores
url https://security.gentoo.org/glsa/202007-39
15
reference_url https://access.redhat.com/errata/RHSA-2020:4465
reference_id RHSA-2020:4465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4465
16
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
17
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-17450
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua83-5ewj-aqha
41
url VCID-uv2k-fpc4-pbdc
vulnerability_id VCID-uv2k-fpc4-pbdc
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14444
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.62409
published_at 2026-04-01T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62467
published_at 2026-04-02T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62499
published_at 2026-04-04T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62466
published_at 2026-04-07T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.62517
published_at 2026-04-08T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62533
published_at 2026-04-09T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62552
published_at 2026-04-11T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62541
published_at 2026-04-12T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62518
published_at 2026-04-13T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.62559
published_at 2026-04-16T12:55:00Z
10
value 0.00429
scoring_system epss
scoring_elements 0.62565
published_at 2026-04-18T12:55:00Z
11
value 0.00429
scoring_system epss
scoring_elements 0.62547
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1740469
reference_id 1740469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1740469
5
reference_url https://security.gentoo.org/glsa/202007-39
reference_id GLSA-202007-39
reference_type
scores
url https://security.gentoo.org/glsa/202007-39
6
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-14444
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uv2k-fpc4-pbdc
42
url VCID-vepg-jnnm-97d7
vulnerability_id VCID-vepg-jnnm-97d7
summary Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20294
reference_id
reference_type
scores
0
value 0.1586
scoring_system epss
scoring_elements 0.9472
published_at 2026-04-02T12:55:00Z
1
value 0.1586
scoring_system epss
scoring_elements 0.94712
published_at 2026-04-01T12:55:00Z
2
value 0.1586
scoring_system epss
scoring_elements 0.94724
published_at 2026-04-04T12:55:00Z
3
value 0.22712
scoring_system epss
scoring_elements 0.95883
published_at 2026-04-21T12:55:00Z
4
value 0.22712
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-16T12:55:00Z
5
value 0.22712
scoring_system epss
scoring_elements 0.95881
published_at 2026-04-18T12:55:00Z
6
value 0.22712
scoring_system epss
scoring_elements 0.95848
published_at 2026-04-07T12:55:00Z
7
value 0.22712
scoring_system epss
scoring_elements 0.95857
published_at 2026-04-08T12:55:00Z
8
value 0.22712
scoring_system epss
scoring_elements 0.9586
published_at 2026-04-09T12:55:00Z
9
value 0.22712
scoring_system epss
scoring_elements 0.95863
published_at 2026-04-12T12:55:00Z
10
value 0.22712
scoring_system epss
scoring_elements 0.95864
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1943533
reference_id 1943533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1943533
5
reference_url https://security.archlinux.org/AVG-1385
reference_id AVG-1385
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1385
6
reference_url https://security.gentoo.org/glsa/202208-30
reference_id GLSA-202208-30
reference_type
scores
url https://security.gentoo.org/glsa/202208-30
fixed_packages
0
url pkg:deb/debian/binutils@2.35.2-2
purl pkg:deb/debian/binutils@2.35.2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2feg-zk6f-jqax
1
vulnerability VCID-2sxq-338y-zudp
2
vulnerability VCID-3abw-ksjw-hkff
3
vulnerability VCID-3j3x-b5s8-p7c1
4
vulnerability VCID-4d5t-1hwt-43at
5
vulnerability VCID-4k1k-tmj9-zyar
6
vulnerability VCID-4uea-bxbr-2kdz
7
vulnerability VCID-5cqh-f862-zugq
8
vulnerability VCID-5rak-8wp8-hqcm
9
vulnerability VCID-66e8-kf7g-2bcv
10
vulnerability VCID-6cjq-sz9f-mqf9
11
vulnerability VCID-6kvf-hsu3-nfc3
12
vulnerability VCID-6v51-g3b9-3qbf
13
vulnerability VCID-7sc8-fzw3-vfer
14
vulnerability VCID-7vbm-bp51-4faa
15
vulnerability VCID-84t7-666n-fydn
16
vulnerability VCID-88yz-vyfa-xuec
17
vulnerability VCID-8p5q-y7th-e7a3
18
vulnerability VCID-9v6f-mzak-87d6
19
vulnerability VCID-a6f4-kkt1-yugs
20
vulnerability VCID-b7k7-s2rd-j3h1
21
vulnerability VCID-bmef-m4dw-kbeu
22
vulnerability VCID-by8y-uamt-f7bt
23
vulnerability VCID-cjbb-xm4r-c3b5
24
vulnerability VCID-cxp6-cmpk-7uff
25
vulnerability VCID-dfhw-bvdv-4udd
26
vulnerability VCID-e8f4-9g99-6yet
27
vulnerability VCID-ek5t-65by-syac
28
vulnerability VCID-f47d-fm3y-q3b9
29
vulnerability VCID-ftkb-qtse-afhq
30
vulnerability VCID-fx6h-7q2k-5fd2
31
vulnerability VCID-hd32-zxxu-6bh4
32
vulnerability VCID-hsyc-q23j-2ua3
33
vulnerability VCID-j49e-hexk-7kgd
34
vulnerability VCID-jm7b-4gnb-uygv
35
vulnerability VCID-k4nr-2da1-jke3
36
vulnerability VCID-k6ey-kdwp-17ed
37
vulnerability VCID-kh2b-vdkt-nkep
38
vulnerability VCID-kvn8-qddz-vqag
39
vulnerability VCID-mtb5-2vq5-4yf7
40
vulnerability VCID-pejn-n3rz-33bs
41
vulnerability VCID-pjtw-r398-uqgw
42
vulnerability VCID-pkej-frsd-gqdk
43
vulnerability VCID-q1nv-rtqz-4fhk
44
vulnerability VCID-r1u7-ujc5-g7aw
45
vulnerability VCID-rcs3-znj9-pbb8
46
vulnerability VCID-rcxk-qvqu-y3fj
47
vulnerability VCID-sdx4-5wtj-hbf9
48
vulnerability VCID-syyt-ureu-23h8
49
vulnerability VCID-t9qr-esv2-g7he
50
vulnerability VCID-tcc9-936c-vkhk
51
vulnerability VCID-tmj2-8abu-fuen
52
vulnerability VCID-ugns-tvmf-e7c7
53
vulnerability VCID-uqym-35ay-uua8
54
vulnerability VCID-uv5p-15z7-fqcn
55
vulnerability VCID-vcgu-7pzk-2udx
56
vulnerability VCID-vj46-k8jn-a7ew
57
vulnerability VCID-vjrz-ss5c-skcc
58
vulnerability VCID-vwk2-2pwb-muhu
59
vulnerability VCID-wj3y-5jmt-7ugw
60
vulnerability VCID-x3kv-wwqy-8bav
61
vulnerability VCID-xdh7-9hu5-vfa6
62
vulnerability VCID-y2a1-fczv-k7e2
63
vulnerability VCID-ycgk-1xz6-h3fm
64
vulnerability VCID-z1d7-yjdv-hyh8
65
vulnerability VCID-znqk-35mz-dqfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2
aliases CVE-2021-20294
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7
43
url VCID-w17q-m7sf-23fx
vulnerability_id VCID-w17q-m7sf-23fx
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20002
reference_id
reference_type
scores
0
value 0.00315
scoring_system epss
scoring_elements 0.54537
published_at 2026-04-01T12:55:00Z
1
value 0.00315
scoring_system epss
scoring_elements 0.5465
published_at 2026-04-08T12:55:00Z
2
value 0.00315
scoring_system epss
scoring_elements 0.54607
published_at 2026-04-02T12:55:00Z
3
value 0.00315
scoring_system epss
scoring_elements 0.5463
published_at 2026-04-04T12:55:00Z
4
value 0.00315
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-07T12:55:00Z
5
value 0.00315
scoring_system epss
scoring_elements 0.54645
published_at 2026-04-09T12:55:00Z
6
value 0.00315
scoring_system epss
scoring_elements 0.54658
published_at 2026-04-11T12:55:00Z
7
value 0.00315
scoring_system epss
scoring_elements 0.5464
published_at 2026-04-12T12:55:00Z
8
value 0.0033
scoring_system epss
scoring_elements 0.55996
published_at 2026-04-18T12:55:00Z
9
value 0.0033
scoring_system epss
scoring_elements 0.55971
published_at 2026-04-21T12:55:00Z
10
value 0.0033
scoring_system epss
scoring_elements 0.55957
published_at 2026-04-13T12:55:00Z
11
value 0.0033
scoring_system epss
scoring_elements 0.55994
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20002
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1661534
reference_id 1661534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1661534
5
reference_url https://security.archlinux.org/ASA-201906-3
reference_id ASA-201906-3
reference_type
scores
url https://security.archlinux.org/ASA-201906-3
6
reference_url https://security.archlinux.org/AVG-832
reference_id AVG-832
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-832
7
reference_url https://security.gentoo.org/glsa/201908-01
reference_id GLSA-201908-01
reference_type
scores
url https://security.gentoo.org/glsa/201908-01
8
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-20002
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx
44
url VCID-w6mz-3zaq-qffk
vulnerability_id VCID-w6mz-3zaq-qffk
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9073
reference_id
reference_type
scores
0
value 0.00268
scoring_system epss
scoring_elements 0.50338
published_at 2026-04-21T12:55:00Z
1
value 0.00268
scoring_system epss
scoring_elements 0.5036
published_at 2026-04-16T12:55:00Z
2
value 0.00268
scoring_system epss
scoring_elements 0.50363
published_at 2026-04-18T12:55:00Z
3
value 0.00268
scoring_system epss
scoring_elements 0.5026
published_at 2026-04-01T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.503
published_at 2026-04-02T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50329
published_at 2026-04-04T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50277
published_at 2026-04-07T12:55:00Z
7
value 0.00268
scoring_system epss
scoring_elements 0.5033
published_at 2026-04-08T12:55:00Z
8
value 0.00268
scoring_system epss
scoring_elements 0.50323
published_at 2026-04-09T12:55:00Z
9
value 0.00268
scoring_system epss
scoring_elements 0.50352
published_at 2026-04-11T12:55:00Z
10
value 0.00268
scoring_system epss
scoring_elements 0.50326
published_at 2026-04-12T12:55:00Z
11
value 0.00268
scoring_system epss
scoring_elements 0.50315
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24233
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24233
6
reference_url https://support.f5.com/csp/article/K37121474
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K37121474
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680662
reference_id 1680662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680662
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9073
reference_id CVE-2019-9073
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9073
13
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
14
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
15
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9073
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6mz-3zaq-qffk
45
url VCID-xrfz-4jk8-auaw
vulnerability_id VCID-xrfz-4jk8-auaw
summary binutils: Integer overflow in load_specific_debug_section function
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20671
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.2939
published_at 2026-04-01T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29287
published_at 2026-04-21T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29335
published_at 2026-04-13T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29357
published_at 2026-04-16T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29331
published_at 2026-04-18T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29458
published_at 2026-04-02T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29506
published_at 2026-04-04T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29324
published_at 2026-04-07T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-12T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29429
published_at 2026-04-09T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29433
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20671
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24005
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24005
7
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca
8
reference_url http://www.securityfocus.com/bid/106457
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106457
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1664712
reference_id 1664712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1664712
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20671
reference_id CVE-2018-20671
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20671
12
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
13
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
14
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-20671
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrfz-4jk8-auaw
46
url VCID-xysa-jvv6-9yd6
vulnerability_id VCID-xysa-jvv6-9yd6
summary binutils: invalid memory access in bfd_zalloc in opncls.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17359
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-21T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.5447
published_at 2026-04-01T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54545
published_at 2026-04-02T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54569
published_at 2026-04-04T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54537
published_at 2026-04-07T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54589
published_at 2026-04-08T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54583
published_at 2026-04-09T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54595
published_at 2026-04-18T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-12T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54556
published_at 2026-04-13T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54593
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1632914
reference_id 1632914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1632914
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-17359
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xysa-jvv6-9yd6
47
url VCID-yqu7-y3b9-gkg8
vulnerability_id VCID-yqu7-y3b9-gkg8
summary binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35342
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29158
published_at 2026-04-01T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29233
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29063
published_at 2026-04-21T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29109
published_at 2026-04-13T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29135
published_at 2026-04-16T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29112
published_at 2026-04-18T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29283
published_at 2026-04-04T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29098
published_at 2026-04-07T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29161
published_at 2026-04-12T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29202
published_at 2026-04-09T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2233998
reference_id 2233998
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2233998
5
reference_url https://security.netapp.com/advisory/ntap-20231006-0009/
reference_id ntap-20231006-0009
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/
url https://security.netapp.com/advisory/ntap-20231006-0009/
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=25319
reference_id show_bug.cgi?id=25319
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/
url https://sourceware.org/bugzilla/show_bug.cgi?id=25319
7
reference_url https://usn.ubuntu.com/6381-1/
reference_id USN-6381-1
reference_type
scores
url https://usn.ubuntu.com/6381-1/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35342
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqu7-y3b9-gkg8
48
url VCID-z6f9-bgge-wygt
vulnerability_id VCID-z6f9-bgge-wygt
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9071
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36245
published_at 2026-04-01T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36293
published_at 2026-04-21T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36364
published_at 2026-04-16T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36347
published_at 2026-04-18T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36436
published_at 2026-04-02T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36468
published_at 2026-04-04T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36303
published_at 2026-04-07T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-08T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36372
published_at 2026-04-09T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36379
published_at 2026-04-11T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36344
published_at 2026-04-12T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36322
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9071
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
3
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24227
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24227
6
reference_url https://support.f5.com/csp/article/K02884135
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K02884135
7
reference_url http://www.securityfocus.com/bid/107147
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107147
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680657
reference_id 1680657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680657
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9071
reference_id CVE-2019-9071
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9071
16
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
17
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
18
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
19
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2019-9071
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6f9-bgge-wygt
49
url VCID-zcmh-czy1-xqca
vulnerability_id VCID-zcmh-czy1-xqca
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35495
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30854
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.3098
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31027
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30845
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30903
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30934
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30936
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30893
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30849
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30859
published_at 2026-04-18T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30825
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911441
reference_id 1911441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911441
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2020-35495
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcmh-czy1-xqca
50
url VCID-zgnj-1jpn-nudx
vulnerability_id VCID-zgnj-1jpn-nudx
summary binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17360
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63048
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63107
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63137
published_at 2026-04-04T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63101
published_at 2026-04-07T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63153
published_at 2026-04-08T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-09T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63188
published_at 2026-04-11T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-21T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-13T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63185
published_at 2026-04-16T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63193
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1632921
reference_id 1632921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1632921
5
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:deb/debian/binutils@2.35-2
purl pkg:deb/debian/binutils@2.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vepg-jnnm-97d7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2
aliases CVE-2018-17360
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnj-1jpn-nudx
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.31.1-14