Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1050304?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1050304?format=api", "purl": "pkg:deb/debian/binutils@2.31.1-15", "type": "deb", "namespace": "debian", "name": "binutils", "version": "2.31.1-15", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.43.1-5", "latest_non_vulnerable_version": "2.45.50.20251125-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58588?format=api", "vulnerability_id": "VCID-24yc-9zfd-skax", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.62", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61902", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61951", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.6199", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949", "reference_id": "1658949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949" }, { "reference_url": "https://security.archlinux.org/ASA-201906-3", "reference_id": "ASA-201906-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-3" }, { "reference_url": "https://security.archlinux.org/AVG-832", "reference_id": "AVG-832", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-832" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-19932" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49730?format=api", "vulnerability_id": "VCID-355u-uwc8-kfap", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63618", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63703", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00451", "scoring_system": "epss", "scoring_elements": "0.63732", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24229", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24229" }, { "reference_url": "https://support.f5.com/csp/article/K13534168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K13534168" }, { "reference_url": "http://www.securityfocus.com/bid/107147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680651", "reference_id": "1680651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680651" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9070", "reference_id": "CVE-2019-9070", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9070" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9070" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-355u-uwc8-kfap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83558?format=api", "vulnerability_id": "VCID-364t-fc6u-w7h4", "summary": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12934", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71963", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72051", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7204", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72024", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7199", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72017", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12934" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23059", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23059" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597853", "reference_id": "1597853", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597853" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934", "reference_id": "CVE-2018-12934", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-12934" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-364t-fc6u-w7h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49744?format=api", "vulnerability_id": "VCID-3v94-m5uz-kyg5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45669", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911691", "reference_id": "1911691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911691" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35507" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v94-m5uz-kyg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58582?format=api", "vulnerability_id": "VCID-42yc-u5rt-tua5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.815", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.8148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81425", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81445", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01561", "scoring_system": "epss", "scoring_elements": "0.81478", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057" }, { "reference_url": "http://www.securityfocus.com/bid/104538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104538" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417", "reference_id": "1595417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697", "reference_id": "CVE-2018-12697", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075", "reference_id": "RHSA-2019:2075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2075" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-12697" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42yc-u5rt-tua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56159?format=api", "vulnerability_id": "VCID-4adx-y65a-v7b8", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12972", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69658", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69876", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69928", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69945", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.6988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00617", "scoring_system": "epss", "scoring_elements": "0.69888", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831873", "reference_id": "1831873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831873" }, { "reference_url": "https://security.gentoo.org/glsa/202007-39", "reference_id": "GLSA-202007-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-39" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-12972" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4adx-y65a-v7b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83045?format=api", "vulnerability_id": "VCID-4wvj-4tta-euhv", "summary": "binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18606", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71473", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.7148", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71497", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.7147", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71511", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71523", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.7153", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71558", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647415", "reference_id": "1647415", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647415" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18606" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wvj-4tta-euhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80718?format=api", "vulnerability_id": "VCID-52jz-yyum-7qcw", "summary": "binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22217", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2243", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22335", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22275", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2228", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906762", "reference_id": "1906762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906762" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-16599" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52jz-yyum-7qcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81779?format=api", "vulnerability_id": "VCID-5fwg-b16u-cybk", "summary": "binutils: memory leak in get_field() in microblaze-dis.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06089", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06136", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06208", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233943", "reference_id": "2233943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233943" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0007/", "reference_id": "ntap-20230929-0007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230929-0007/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249", "reference_id": "show_bug.cgi?id=25249", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-21490" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwg-b16u-cybk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48817?format=api", "vulnerability_id": "VCID-74th-5s6d-5fb9", "summary": "A buffer overflow in gdb might allow a remote attacker to cause a\n Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53961", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53988", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53943", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740615", "reference_id": "1740615", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740615" }, { "reference_url": "https://security.gentoo.org/glsa/202003-31", "reference_id": "GLSA-202003-31", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-31" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1635", "reference_id": "RHSA-2020:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1635" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-1010180" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74th-5s6d-5fb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83055?format=api", "vulnerability_id": "VCID-858u-d8cb-m3ca", "summary": "binutils: Stack exhaustion in cp-demangle.c allows for denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.3588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.3591", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35741", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39252", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00177", "scoring_system": "epss", "scoring_elements": "0.39198", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645958", "reference_id": "1645958", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645958" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18484" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-858u-d8cb-m3ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49743?format=api", "vulnerability_id": "VCID-8k17-exgp-8kb6", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45669", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911444", "reference_id": "1911444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911444" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35496" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k17-exgp-8kb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83043?format=api", "vulnerability_id": "VCID-9zeg-2c76-nydc", "summary": "binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56187", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63166", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18701" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646529", "reference_id": "1646529", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646529" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18701" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zeg-2c76-nydc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56163?format=api", "vulnerability_id": "VCID-a9f1-agdt-2udp", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17451", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72891", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72988", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72953", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72947", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.7292", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72895", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72946", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17451" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191024-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20191024-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25070" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771668", "reference_id": "1771668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771668" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17451", "reference_id": "CVE-2019-17451", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17451" }, { "reference_url": "https://security.gentoo.org/glsa/202007-39", "reference_id": "GLSA-202007-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1797", "reference_id": "RHSA-2020:1797", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1797" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-17451" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9f1-agdt-2udp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83044?format=api", "vulnerability_id": "VCID-ac8t-y71t-mub4", "summary": "binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61847", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61866", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61903", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00687", "scoring_system": "epss", "scoring_elements": "0.71755", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00687", "scoring_system": "epss", "scoring_elements": "0.71711", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18605" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647403", "reference_id": "1647403", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647403" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18605" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac8t-y71t-mub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80722?format=api", "vulnerability_id": "VCID-awj8-tc5z-8qdc", "summary": "binutils: double free vulnerability in process_symbol_table could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5495", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54954", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54935", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54942", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56033", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906782", "reference_id": "1906782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906782" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-16590" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awj8-tc5z-8qdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49734?format=api", "vulnerability_id": "VCID-awuy-3kcy-zyev", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25059", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24999", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25182", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25067", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24235" }, { "reference_url": "https://support.f5.com/csp/article/K09092524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K09092524" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680665", "reference_id": "1680665", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680665" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9074", "reference_id": "CVE-2019-9074", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9074" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9074" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awuy-3kcy-zyev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82907?format=api", "vulnerability_id": "VCID-bz7s-dtce-e3bb", "summary": "binutils: Use-after-free in the error function", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55302", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5544", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55471", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55459", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55441", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049" }, { "reference_url": "https://support.f5.com/csp/article/K38336243", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "https://support.f5.com/csp/article/K38336243" }, { "reference_url": "http://www.securityfocus.com/bid/106370", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "http://www.securityfocus.com/bid/106370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664700", "reference_id": "1664700", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664700" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20623", "reference_id": "CVE-2018-20623", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20623" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/" } ], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-20623" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz7s-dtce-e3bb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49740?format=api", "vulnerability_id": "VCID-ckh9-wqe3-euhu", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35493", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42885", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4292", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42835", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45525", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45428", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911437", "reference_id": "1911437", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911437" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35493" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckh9-wqe3-euhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58583?format=api", "vulnerability_id": "VCID-e98q-uqeq-g7ef", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83128", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83231", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83159", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83157", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01892", "scoring_system": "epss", "scoring_elements": "0.83189", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057" }, { "reference_url": "http://www.securityfocus.com/bid/104539", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104539" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419", "reference_id": "1595419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698", "reference_id": "CVE-2018-12698", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-12698" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e98q-uqeq-g7ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84643?format=api", "vulnerability_id": "VCID-edt6-dqcw-duea", "summary": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4849", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48555", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64075", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6404", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645957", "reference_id": "1645957", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645957" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18483" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edt6-dqcw-duea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83100?format=api", "vulnerability_id": "VCID-et14-hrds-qbf5", "summary": "binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17794", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.63998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.63986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64053", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64064", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64051", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64056", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17794" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635082", "reference_id": "1635082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635082" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-17794" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et14-hrds-qbf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58584?format=api", "vulnerability_id": "VCID-g97f-4w1h-uud8", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66669", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67813", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67777", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057" }, { "reference_url": "http://www.securityfocus.com/bid/104540", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104540" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427", "reference_id": "1595427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699", "reference_id": "CVE-2018-12699", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9689", "reference_id": "RHSA-2024:9689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9689" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-12699" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g97f-4w1h-uud8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83129?format=api", "vulnerability_id": "VCID-gmsc-hu9c-9ybb", "summary": "binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63404", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63506", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63523", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6354", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63524", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63526", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632908", "reference_id": "1632908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632908" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-17358" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsc-hu9c-9ybb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49735?format=api", "vulnerability_id": "VCID-gws5-9vy4-vqa1", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50879", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50857", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50825", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00274", "scoring_system": "epss", "scoring_elements": "0.50839", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24236" }, { "reference_url": "https://support.f5.com/csp/article/K42059040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K42059040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680669", "reference_id": "1680669", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680669" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9075", "reference_id": "CVE-2019-9075", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9075" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9075" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gws5-9vy4-vqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49741?format=api", "vulnerability_id": "VCID-hbpa-49pk-67dy", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29847", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29849", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29781", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911439", "reference_id": "1911439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911439" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35494" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hbpa-49pk-67dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81678?format=api", "vulnerability_id": "VCID-jrbf-3aut-e7ey", "summary": "binutils: memory leak in get_data() in nm.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05293", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05279", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05271", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05328", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233930", "reference_id": "2233930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233930" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a", "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/" } ], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362", "reference_id": "show_bug.cgi?id=25362", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-19724" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrbf-3aut-e7ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56160?format=api", "vulnerability_id": "VCID-jz8y-4wcy-6yhc", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14250", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40919", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40847", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40903", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4092", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40907", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739490", "reference_id": "1739490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739490" }, { "reference_url": "https://security.gentoo.org/glsa/202007-39", "reference_id": "GLSA-202007-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-39" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-14250" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8y-4wcy-6yhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80719?format=api", "vulnerability_id": "VCID-k6fk-apzd-v7b6", "summary": "binutils: invalid read in process_symbol_table could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60241", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60267", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60164", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906771", "reference_id": "1906771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906771" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-16591" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6fk-apzd-v7b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58587?format=api", "vulnerability_id": "VCID-kuzy-t7d8-kfhd", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.5519", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55169", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55127", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00321", "scoring_system": "epss", "scoring_elements": "0.55188", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947", "reference_id": "1658947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947" }, { "reference_url": "https://security.archlinux.org/ASA-201906-3", "reference_id": "ASA-201906-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-3" }, { "reference_url": "https://security.archlinux.org/AVG-832", "reference_id": "AVG-832", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-832" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-19931" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83571?format=api", "vulnerability_id": "VCID-mz6k-cg6z-d3ct", "summary": "binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-9138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53315", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53365", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53386", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53438", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-9138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564291", "reference_id": "1564291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564291" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-9138" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mz6k-cg6z-d3ct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49737?format=api", "vulnerability_id": "VCID-pwzu-d55f-nqb5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9077", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52666", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52799", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52766", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52711", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52737", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52748", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243" }, { "reference_url": "https://support.f5.com/csp/article/K00056379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K00056379" }, { "reference_url": "http://www.securityfocus.com/bid/107139", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107139" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680675", "reference_id": "1680675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680675" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077", "reference_id": "CVE-2019-9077", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9077" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwzu-d55f-nqb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80720?format=api", "vulnerability_id": "VCID-qz7m-rvgd-xkes", "summary": "binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5495", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54954", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54935", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54942", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56033", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906772", "reference_id": "1906772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906772" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-16593" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qz7m-rvgd-xkes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83036?format=api", "vulnerability_id": "VCID-r3e5-9gq6-zuer", "summary": "binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70216", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70223", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70284", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70293", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.7028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0063", "scoring_system": "epss", "scoring_elements": "0.70322", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646535", "reference_id": "1646535", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646535" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18700" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3e5-9gq6-zuer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83086?format=api", "vulnerability_id": "VCID-rwgp-drg3-2kbp", "summary": "binutils: invalid memory address dereference in read_reloc in reloc.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52699", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52662", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639911", "reference_id": "1639911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639911" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18309" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rwgp-drg3-2kbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80721?format=api", "vulnerability_id": "VCID-s43d-bcvr-8ka9", "summary": "binutils: use-after-free in bfd_hash_lookup could result in DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55524", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55516", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55525", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55515", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56671", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56575", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906777", "reference_id": "1906777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906777" }, { "reference_url": "https://usn.ubuntu.com/5124-1/", "reference_id": "USN-5124-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5124-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-16592" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s43d-bcvr-8ka9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58591?format=api", "vulnerability_id": "VCID-sq8n-whxy-qkb2", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73371", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73311", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73332", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f" }, { "reference_url": "https://support.f5.com/csp/article/K38336243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K38336243" }, { "reference_url": "http://www.securityfocus.com/bid/106440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703", "reference_id": "1664703", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651", "reference_id": "CVE-2018-20651", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-20651" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq8n-whxy-qkb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83140?format=api", "vulnerability_id": "VCID-t3vb-dfc1-7bah", "summary": "binutils: Stack consumption problem caused by the cplus_demangle_type", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38702", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3884", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.3879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38802", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38848", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652723", "reference_id": "1652723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652723" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-17985" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3vb-dfc1-7bah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83046?format=api", "vulnerability_id": "VCID-ta1q-eax9-hfcb", "summary": "binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.5896", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00678", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647421", "reference_id": "1647421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647421" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-18607" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ta1q-eax9-hfcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82935?format=api", "vulnerability_id": "VCID-u1cw-5p72-a7f4", "summary": "binutils: integer overflow leads to heap-based buffer overflow in objdump", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000876", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3293", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32926", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000876" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f" }, { "reference_url": "http://www.securityfocus.com/bid/106304", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699", "reference_id": "1664699", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876", "reference_id": "CVE-2018-1000876", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075", "reference_id": "RHSA-2019:2075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2075" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-1000876" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1cw-5p72-a7f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56162?format=api", "vulnerability_id": "VCID-ua83-5ewj-aqha", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.7777", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77866", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77846", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.7783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01079", "scoring_system": "epss", "scoring_elements": "0.77819", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20191024-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20191024-0002/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25078" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771677", "reference_id": "1771677", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771677" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17450", "reference_id": "CVE-2019-17450", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17450" }, { "reference_url": "https://security.gentoo.org/glsa/202007-39", "reference_id": "GLSA-202007-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4465", "reference_id": "RHSA-2020:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4465" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-17450" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua83-5ewj-aqha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56161?format=api", "vulnerability_id": "VCID-uv2k-fpc4-pbdc", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62467", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62499", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62541", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62518", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00429", "scoring_system": "epss", "scoring_elements": "0.62559", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14444" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740469", "reference_id": "1740469", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740469" }, { "reference_url": "https://security.gentoo.org/glsa/202007-39", "reference_id": "GLSA-202007-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-39" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-14444" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uv2k-fpc4-pbdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47234?format=api", "vulnerability_id": "VCID-vepg-jnnm-97d7", "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1586", "scoring_system": "epss", "scoring_elements": "0.9472", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1586", "scoring_system": "epss", "scoring_elements": "0.94712", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1586", "scoring_system": "epss", "scoring_elements": "0.94724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.95876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.95863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.95864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.95848", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.95857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22712", "scoring_system": "epss", "scoring_elements": "0.9586", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943533", "reference_id": "1943533", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943533" }, { "reference_url": "https://security.archlinux.org/AVG-1385", "reference_id": "AVG-1385", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1385" }, { "reference_url": "https://security.gentoo.org/glsa/202208-30", "reference_id": "GLSA-202208-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-30" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582403?format=api", "purl": "pkg:deb/debian/binutils@2.35.2-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2feg-zk6f-jqax" }, { "vulnerability": "VCID-2sxq-338y-zudp" }, { "vulnerability": "VCID-3abw-ksjw-hkff" }, { "vulnerability": "VCID-3j3x-b5s8-p7c1" }, { "vulnerability": "VCID-4d5t-1hwt-43at" }, { "vulnerability": "VCID-4k1k-tmj9-zyar" }, { "vulnerability": "VCID-4uea-bxbr-2kdz" }, { "vulnerability": "VCID-5cqh-f862-zugq" }, { "vulnerability": "VCID-5rak-8wp8-hqcm" }, { "vulnerability": "VCID-66e8-kf7g-2bcv" }, { "vulnerability": "VCID-6cjq-sz9f-mqf9" }, { "vulnerability": "VCID-6kvf-hsu3-nfc3" }, { "vulnerability": "VCID-6v51-g3b9-3qbf" }, { "vulnerability": "VCID-7sc8-fzw3-vfer" }, { "vulnerability": "VCID-7vbm-bp51-4faa" }, { "vulnerability": "VCID-84t7-666n-fydn" }, { "vulnerability": "VCID-88yz-vyfa-xuec" }, { "vulnerability": "VCID-8p5q-y7th-e7a3" }, { "vulnerability": "VCID-9v6f-mzak-87d6" }, { "vulnerability": "VCID-a6f4-kkt1-yugs" }, { "vulnerability": "VCID-b7k7-s2rd-j3h1" }, { "vulnerability": "VCID-bmef-m4dw-kbeu" }, { "vulnerability": "VCID-by8y-uamt-f7bt" }, { "vulnerability": "VCID-cjbb-xm4r-c3b5" }, { "vulnerability": "VCID-cxp6-cmpk-7uff" }, { "vulnerability": "VCID-dfhw-bvdv-4udd" }, { "vulnerability": "VCID-e8f4-9g99-6yet" }, { "vulnerability": "VCID-ek5t-65by-syac" }, { "vulnerability": "VCID-f47d-fm3y-q3b9" }, { "vulnerability": "VCID-ftkb-qtse-afhq" }, { "vulnerability": "VCID-fx6h-7q2k-5fd2" }, { "vulnerability": "VCID-hd32-zxxu-6bh4" }, { "vulnerability": "VCID-hsyc-q23j-2ua3" }, { "vulnerability": "VCID-j49e-hexk-7kgd" }, { "vulnerability": "VCID-jm7b-4gnb-uygv" }, { "vulnerability": "VCID-k4nr-2da1-jke3" }, { "vulnerability": "VCID-k6ey-kdwp-17ed" }, { "vulnerability": "VCID-kh2b-vdkt-nkep" }, { "vulnerability": "VCID-kvn8-qddz-vqag" }, { "vulnerability": "VCID-mtb5-2vq5-4yf7" }, { "vulnerability": "VCID-pejn-n3rz-33bs" }, { "vulnerability": "VCID-pjtw-r398-uqgw" }, { "vulnerability": "VCID-pkej-frsd-gqdk" }, { "vulnerability": "VCID-q1nv-rtqz-4fhk" }, { "vulnerability": "VCID-r1u7-ujc5-g7aw" }, { "vulnerability": "VCID-rcs3-znj9-pbb8" }, { "vulnerability": "VCID-rcxk-qvqu-y3fj" }, { "vulnerability": "VCID-sdx4-5wtj-hbf9" }, { "vulnerability": "VCID-syyt-ureu-23h8" }, { "vulnerability": "VCID-t9qr-esv2-g7he" }, { "vulnerability": "VCID-tcc9-936c-vkhk" }, { "vulnerability": "VCID-tmj2-8abu-fuen" }, { "vulnerability": "VCID-ugns-tvmf-e7c7" }, { "vulnerability": "VCID-uqym-35ay-uua8" }, { "vulnerability": "VCID-uv5p-15z7-fqcn" }, { "vulnerability": "VCID-vcgu-7pzk-2udx" }, { "vulnerability": "VCID-vj46-k8jn-a7ew" }, { "vulnerability": "VCID-vjrz-ss5c-skcc" }, { "vulnerability": "VCID-vwk2-2pwb-muhu" }, { "vulnerability": "VCID-wj3y-5jmt-7ugw" }, { "vulnerability": "VCID-x3kv-wwqy-8bav" }, { "vulnerability": "VCID-xdh7-9hu5-vfa6" }, { "vulnerability": "VCID-y2a1-fczv-k7e2" }, { "vulnerability": "VCID-ycgk-1xz6-h3fm" }, { "vulnerability": "VCID-z1d7-yjdv-hyh8" }, { "vulnerability": "VCID-znqk-35mz-dqfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2" } ], "aliases": [ "CVE-2021-20294" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58589?format=api", "vulnerability_id": "VCID-w17q-m7sf-23fx", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54537", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.5465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.5464", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54607", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.5463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55994", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534", "reference_id": "1661534", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534" }, { "reference_url": "https://security.archlinux.org/ASA-201906-3", "reference_id": "ASA-201906-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-3" }, { "reference_url": "https://security.archlinux.org/AVG-832", "reference_id": "AVG-832", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-832" }, { "reference_url": "https://security.gentoo.org/glsa/201908-01", "reference_id": "GLSA-201908-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-01" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-20002" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49733?format=api", "vulnerability_id": "VCID-w6mz-3zaq-qffk", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9073", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.5036", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.5026", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50277", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.5033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50323", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00268", "scoring_system": "epss", "scoring_elements": "0.50352", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9073" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24233", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24233" }, { "reference_url": "https://support.f5.com/csp/article/K37121474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K37121474" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680662", "reference_id": "1680662", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680662" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9073", "reference_id": "CVE-2019-9073", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9073" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9073" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6mz-3zaq-qffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82930?format=api", "vulnerability_id": "VCID-xrfz-4jk8-auaw", "summary": "binutils: Integer overflow in load_specific_debug_section function", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2939", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29357", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29429", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29335", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29458", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29388", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24005" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca" }, { "reference_url": "http://www.securityfocus.com/bid/106457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106457" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664712", "reference_id": "1664712", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664712" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671", "reference_id": "CVE-2018-20671", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-20671" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrfz-4jk8-auaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83130?format=api", "vulnerability_id": "VCID-xysa-jvv6-9yd6", "summary": "binutils: invalid memory access in bfd_zalloc in opncls.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17359", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54545", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54569", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54537", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54556", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632914", "reference_id": "1632914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632914" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-17359" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xysa-jvv6-9yd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81703?format=api", "vulnerability_id": "VCID-yqu7-y3b9-gkg8", "summary": "binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29135", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29161", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233998", "reference_id": "2233998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233998" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0009/", "reference_id": "ntap-20231006-0009", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0009/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319", "reference_id": "show_bug.cgi?id=25319", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/" } ], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319" }, { "reference_url": "https://usn.ubuntu.com/6381-1/", "reference_id": "USN-6381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6381-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35342" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqu7-y3b9-gkg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49731?format=api", "vulnerability_id": "VCID-z6f9-bgge-wygt", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9071", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36245", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36344", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36468", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36303", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36352", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36372", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36379", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9071" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071" }, { "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190314-0003/" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24227" }, { "reference_url": "https://support.f5.com/csp/article/K02884135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K02884135" }, { "reference_url": "http://www.securityfocus.com/bid/107147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680657", "reference_id": "1680657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680657" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9071", "reference_id": "CVE-2019-9071", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9071" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" }, { "reference_url": "https://usn.ubuntu.com/4326-1/", "reference_id": "USN-4326-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4326-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2019-9071" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z6f9-bgge-wygt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49742?format=api", "vulnerability_id": "VCID-zcmh-czy1-xqca", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35495", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.31027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30903", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30934", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30893", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3088", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911441", "reference_id": "1911441", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911441" }, { "reference_url": "https://security.gentoo.org/glsa/202107-24", "reference_id": "GLSA-202107-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-24" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2020-35495" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcmh-czy1-xqca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83131?format=api", "vulnerability_id": "VCID-zgnj-1jpn-nudx", "summary": "binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63048", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63107", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63137", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63153", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63185", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632921", "reference_id": "1632921", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632921" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api", "purl": "pkg:deb/debian/binutils@2.35-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vepg-jnnm-97d7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2" } ], "aliases": [ "CVE-2018-17360" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnj-1jpn-nudx" } ], "fixing_vulnerabilities": [], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.31.1-15" }