Lookup for vulnerable packages by Package URL.

GET /api/packages/1050304?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1050304?format=api",
    "purl": "pkg:deb/debian/binutils@2.31.1-15",
    "type": "deb",
    "namespace": "debian",
    "name": "binutils",
    "version": "2.31.1-15",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.43.1-5",
    "latest_non_vulnerable_version": "2.45.50.20251125-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58588?format=api",
            "vulnerability_id": "VCID-24yc-9zfd-skax",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61829",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61979",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61902",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6199",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949",
                    "reference_id": "1658949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-19932"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49730?format=api",
            "vulnerability_id": "VCID-355u-uwc8-kfap",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63618",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63733",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63746",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63698",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63677",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63703",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63663",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63732",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9070"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24229"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K13534168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K13534168"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/107147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/107147"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680651",
                    "reference_id": "1680651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680651"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9070",
                    "reference_id": "CVE-2019-9070",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9070"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9070"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-355u-uwc8-kfap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83558?format=api",
            "vulnerability_id": "VCID-364t-fc6u-w7h4",
            "summary": "binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12934.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71963",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72051",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7204",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72024",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7199",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71966",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72005",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72017",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12934"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23059"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597853",
                    "reference_id": "1597853",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597853"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934",
                    "reference_id": "CVE-2018-12934",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-12934"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-364t-fc6u-w7h4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49744?format=api",
            "vulnerability_id": "VCID-3v94-m5uz-kyg5",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35507",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42686",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42616",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45691",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45661",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4572",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45669",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35507"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911691",
                    "reference_id": "1911691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911691"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35507"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v94-m5uz-kyg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58582?format=api",
            "vulnerability_id": "VCID-42yc-u5rt-tua5",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81416",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.815",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81487",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81445",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81478",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104538"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417",
                    "reference_id": "1595417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
                    "reference_id": "CVE-2018-12697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075",
                    "reference_id": "RHSA-2019:2075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2075"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-12697"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42yc-u5rt-tua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56159?format=api",
            "vulnerability_id": "VCID-4adx-y65a-v7b8",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12972.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69658",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69647",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69618",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69876",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69928",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6988",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69903",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00617",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69888",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12972"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831873",
                    "reference_id": "1831873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831873"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-39",
                    "reference_id": "GLSA-202007-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-39"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-12972"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4adx-y65a-v7b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83045?format=api",
            "vulnerability_id": "VCID-4wvj-4tta-euhv",
            "summary": "binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18606.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71473",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7148",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71497",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7147",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71523",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7153",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71558",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647415",
                    "reference_id": "1647415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647415"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18606"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wvj-4tta-euhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80718?format=api",
            "vulnerability_id": "VCID-52jz-yyum-7qcw",
            "summary": "binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22217",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22385",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2243",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22301",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22356",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22376",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22335",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22275",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2228",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906762",
                    "reference_id": "1906762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906762"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-16599"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52jz-yyum-7qcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81779?format=api",
            "vulnerability_id": "VCID-5fwg-b16u-cybk",
            "summary": "binutils: memory leak in get_field() in microblaze-dis.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06153",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06121",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06194",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06089",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06152",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06136",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06208",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-21490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21490"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233943",
                    "reference_id": "2233943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233943"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907",
                    "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=378fd436405b3051df34ac995b2e03fe1f3d1907"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230929-0007/",
                    "reference_id": "ntap-20230929-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230929-0007/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249",
                    "reference_id": "show_bug.cgi?id=25249",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:16:33Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6381-1/",
                    "reference_id": "USN-6381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6381-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-21490"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fwg-b16u-cybk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48817?format=api",
            "vulnerability_id": "VCID-74th-5s6d-5fb9",
            "summary": "A buffer overflow in gdb might allow a remote attacker to cause a\n    Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1010180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52712",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52673",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53961",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53988",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53964",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54015",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54062",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54043",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53943",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1010180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740615",
                    "reference_id": "1740615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740615"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-31",
                    "reference_id": "GLSA-202003-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1635",
                    "reference_id": "RHSA-2020:1635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1635"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-1010180"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74th-5s6d-5fb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83055?format=api",
            "vulnerability_id": "VCID-858u-d8cb-m3ca",
            "summary": "binutils: Stack exhaustion in cp-demangle.c allows for denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3588",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3591",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35791",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39252",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39198",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645958",
                    "reference_id": "1645958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645958"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18484"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-858u-d8cb-m3ca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49743?format=api",
            "vulnerability_id": "VCID-8k17-exgp-8kb6",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42686",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42616",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45691",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45661",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4572",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45669",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35496"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911444",
                    "reference_id": "1911444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911444"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35496"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k17-exgp-8kb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83043?format=api",
            "vulnerability_id": "VCID-9zeg-2c76-nydc",
            "summary": "binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18701.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56154",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63225",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6322",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63272",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63306",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6329",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63166",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18701"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646529",
                    "reference_id": "1646529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646529"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18701"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zeg-2c76-nydc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56163?format=api",
            "vulnerability_id": "VCID-a9f1-agdt-2udp",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17451.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72988",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72971",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72953",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72947",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72899",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7292",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72895",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00741",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72946",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17451"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191024-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191024-0002/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25070"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771668",
                    "reference_id": "1771668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771668"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17451",
                    "reference_id": "CVE-2019-17451",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17451"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-39",
                    "reference_id": "GLSA-202007-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1797",
                    "reference_id": "RHSA-2020:1797",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1797"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-17451"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9f1-agdt-2udp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83044?format=api",
            "vulnerability_id": "VCID-ac8t-y71t-mub4",
            "summary": "binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18605.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61743",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61847",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61866",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61882",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61903",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61892",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71755",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71711",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18605"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647403",
                    "reference_id": "1647403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647403"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18605"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac8t-y71t-mub4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80722?format=api",
            "vulnerability_id": "VCID-awj8-tc5z-8qdc",
            "summary": "binutils: double free vulnerability in process_symbol_table could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16590.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54941",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54954",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54935",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54912",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54942",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56142",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56162",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56033",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16590"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906782",
                    "reference_id": "1906782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906782"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-16590"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awj8-tc5z-8qdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49734?format=api",
            "vulnerability_id": "VCID-awuy-3kcy-zyev",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25059",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24999",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25082",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25041",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24987",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25142",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24954",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25067",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24235"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K09092524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K09092524"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680665",
                    "reference_id": "1680665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680665"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9074",
                    "reference_id": "CVE-2019-9074",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9074"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9074"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awuy-3kcy-zyev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82907?format=api",
            "vulnerability_id": "VCID-bz7s-dtce-e3bb",
            "summary": "binutils: Use-after-free in the error function",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55478",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55302",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5544",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5547",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55471",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55459",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55441",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K38336243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K38336243"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106370"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664700",
                    "reference_id": "1664700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664700"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20623",
                    "reference_id": "CVE-2018-20623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20623"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:03:18Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-20623"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz7s-dtce-e3bb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49740?format=api",
            "vulnerability_id": "VCID-ckh9-wqe3-euhu",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42929",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42885",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42868",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42835",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45428",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35493"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911437",
                    "reference_id": "1911437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911437"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35493"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckh9-wqe3-euhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58583?format=api",
            "vulnerability_id": "VCID-e98q-uqeq-g7ef",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83128",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83231",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83205",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83195",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83182",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83189",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104539"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419",
                    "reference_id": "1595419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698",
                    "reference_id": "CVE-2018-12698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-12698"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e98q-uqeq-g7ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84643?format=api",
            "vulnerability_id": "VCID-edt6-dqcw-duea",
            "summary": "binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18483.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4849",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48526",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48555",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64075",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6404",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645957",
                    "reference_id": "1645957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18483"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edt6-dqcw-duea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83100?format=api",
            "vulnerability_id": "VCID-et14-hrds-qbf5",
            "summary": "binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17794.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6394",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63998",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64026",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63986",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64064",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64051",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64021",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00459",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64056",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635082",
                    "reference_id": "1635082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635082"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-17794"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et14-hrds-qbf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58584?format=api",
            "vulnerability_id": "VCID-g97f-4w1h-uud8",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66669",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66772",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67813",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67777",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104540"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427",
                    "reference_id": "1595427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
                    "reference_id": "CVE-2018-12699",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9689",
                    "reference_id": "RHSA-2024:9689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9689"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-12699"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g97f-4w1h-uud8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83129?format=api",
            "vulnerability_id": "VCID-gmsc-hu9c-9ybb",
            "summary": "binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17358.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63404",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63455",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63506",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63523",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6354",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63524",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63526",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632908",
                    "reference_id": "1632908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632908"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-17358"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmsc-hu9c-9ybb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49735?format=api",
            "vulnerability_id": "VCID-gws5-9vy4-vqa1",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50743",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50841",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50838",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50879",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50857",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50825",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50783",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50839",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9075"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24236"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K42059040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K42059040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680669",
                    "reference_id": "1680669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680669"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9075",
                    "reference_id": "CVE-2019-9075",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9075"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9075"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gws5-9vy4-vqa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49741?format=api",
            "vulnerability_id": "VCID-hbpa-49pk-67dy",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29847",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29892",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29752",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29849",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29762",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29781",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911439",
                    "reference_id": "1911439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911439"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35494"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hbpa-49pk-67dy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81678?format=api",
            "vulnerability_id": "VCID-jrbf-3aut-e7ey",
            "summary": "binutils: memory leak in get_data() in nm.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-19724.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05172",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05279",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05247",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05271",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05306",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05328",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19724"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233930",
                    "reference_id": "2233930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233930"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a",
                    "reference_id": "gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=805f38bc551de820bcd7b31d3c5731ae27cf853a"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362",
                    "reference_id": "show_bug.cgi?id=25362",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:26:28Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6381-1/",
                    "reference_id": "USN-6381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6381-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-19724"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrbf-3aut-e7ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56160?format=api",
            "vulnerability_id": "VCID-jz8y-4wcy-6yhc",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14250.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14250",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40809",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40892",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40919",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40847",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40903",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4092",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40865",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40907",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14250"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739490",
                    "reference_id": "1739490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739490"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-39",
                    "reference_id": "GLSA-202007-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-39"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-14250"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8y-4wcy-6yhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80719?format=api",
            "vulnerability_id": "VCID-k6fk-apzd-v7b6",
            "summary": "binutils: invalid read in process_symbol_table could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59228",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59241",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59243",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59176",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60241",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60267",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60164",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16591"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906771",
                    "reference_id": "1906771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906771"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-16591"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6fk-apzd-v7b6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58587?format=api",
            "vulnerability_id": "VCID-kuzy-t7d8-kfhd",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55027",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5519",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55169",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55151",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55152",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55177",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55188",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947",
                    "reference_id": "1658947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-19931"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83571?format=api",
            "vulnerability_id": "VCID-mz6k-cg6z-d3ct",
            "summary": "binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-9138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53315",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53365",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53386",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53433",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.534",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53438",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-9138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564291",
                    "reference_id": "1564291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564291"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-9138"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mz6k-cg6z-d3ct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49737?format=api",
            "vulnerability_id": "VCID-pwzu-d55f-nqb5",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52666",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52804",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52799",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52711",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52737",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52748",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9077"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24243"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K00056379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K00056379"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/107139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/107139"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680675",
                    "reference_id": "1680675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680675"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077",
                    "reference_id": "CVE-2019-9077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9077"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9077"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwzu-d55f-nqb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80720?format=api",
            "vulnerability_id": "VCID-qz7m-rvgd-xkes",
            "summary": "binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16593.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54941",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54954",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54935",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54912",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54942",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56142",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56162",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56033",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16593"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906772",
                    "reference_id": "1906772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906772"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-16593"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qz7m-rvgd-xkes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83036?format=api",
            "vulnerability_id": "VCID-r3e5-9gq6-zuer",
            "summary": "binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70216",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70246",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70223",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70269",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70284",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70308",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70293",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7028",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70322",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646535",
                    "reference_id": "1646535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646535"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18700"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3e5-9gq6-zuer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83086?format=api",
            "vulnerability_id": "VCID-rwgp-drg3-2kbp",
            "summary": "binutils: invalid memory address dereference in read_reloc in reloc.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18309.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38995",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38948",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52707",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52699",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52744",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52795",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52662",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639911",
                    "reference_id": "1639911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639911"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18309"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rwgp-drg3-2kbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80721?format=api",
            "vulnerability_id": "VCID-s43d-bcvr-8ka9",
            "summary": "binutils: use-after-free in bfd_hash_lookup could result in DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16592.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55524",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55516",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55525",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55487",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55515",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56671",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56692",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56575",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16592"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906777",
                    "reference_id": "1906777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906777"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5124-1/",
                    "reference_id": "USN-5124-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5124-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-16592"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s43d-bcvr-8ka9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58591?format=api",
            "vulnerability_id": "VCID-sq8n-whxy-qkb2",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73278",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73371",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73356",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73336",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73311",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73332",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K38336243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K38336243"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106440"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703",
                    "reference_id": "1664703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651",
                    "reference_id": "CVE-2018-20651",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-20651"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq8n-whxy-qkb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83140?format=api",
            "vulnerability_id": "VCID-t3vb-dfc1-7bah",
            "summary": "binutils: Stack consumption problem caused by the cplus_demangle_type",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17985.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38702",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3884",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38861",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3879",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38842",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38802",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38848",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17985"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652723",
                    "reference_id": "1652723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652723"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-17985"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3vb-dfc1-7bah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83046?format=api",
            "vulnerability_id": "VCID-ta1q-eax9-hfcb",
            "summary": "binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58971",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5896",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59018",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59037",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71558",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71512",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647421",
                    "reference_id": "1647421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647421"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-18607"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ta1q-eax9-hfcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82935?format=api",
            "vulnerability_id": "VCID-u1cw-5p72-a7f4",
            "summary": "binutils: integer overflow leads to heap-based buffer overflow in objdump",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000876.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32862",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32906",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32892",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32866",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32992",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32849",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32926",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23994"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=3a551c7a1b80fca579461774860574eabfd7f18f"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106304"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699",
                    "reference_id": "1664699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664699"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
                    "reference_id": "CVE-2018-1000876",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075",
                    "reference_id": "RHSA-2019:2075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2075"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-1000876"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1cw-5p72-a7f4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56162?format=api",
            "vulnerability_id": "VCID-ua83-5ewj-aqha",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17450.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7777",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77866",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77846",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77831",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7783",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77787",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77819",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17450"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191024-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191024-0002/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25078"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771677",
                    "reference_id": "1771677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771677"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17450",
                    "reference_id": "CVE-2019-17450",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17450"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-39",
                    "reference_id": "GLSA-202007-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4465",
                    "reference_id": "RHSA-2020:4465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4465"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-17450"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua83-5ewj-aqha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56161?format=api",
            "vulnerability_id": "VCID-uv2k-fpc4-pbdc",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14444.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62409",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62467",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62499",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62466",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62517",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62533",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62541",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62518",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00429",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62559",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14444"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740469",
                    "reference_id": "1740469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740469"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-39",
                    "reference_id": "GLSA-202007-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-39"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-14444"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uv2k-fpc4-pbdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47234?format=api",
            "vulnerability_id": "VCID-vepg-jnnm-97d7",
            "summary": "Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20294.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9472",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94712",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95864",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95857",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9586",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943533",
                    "reference_id": "1943533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943533"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1385",
                    "reference_id": "AVG-1385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-30",
                    "reference_id": "GLSA-202208-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-30"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582403?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35.2-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2feg-zk6f-jqax"
                        },
                        {
                            "vulnerability": "VCID-2sxq-338y-zudp"
                        },
                        {
                            "vulnerability": "VCID-3abw-ksjw-hkff"
                        },
                        {
                            "vulnerability": "VCID-3j3x-b5s8-p7c1"
                        },
                        {
                            "vulnerability": "VCID-4d5t-1hwt-43at"
                        },
                        {
                            "vulnerability": "VCID-4k1k-tmj9-zyar"
                        },
                        {
                            "vulnerability": "VCID-4uea-bxbr-2kdz"
                        },
                        {
                            "vulnerability": "VCID-5cqh-f862-zugq"
                        },
                        {
                            "vulnerability": "VCID-5rak-8wp8-hqcm"
                        },
                        {
                            "vulnerability": "VCID-66e8-kf7g-2bcv"
                        },
                        {
                            "vulnerability": "VCID-6cjq-sz9f-mqf9"
                        },
                        {
                            "vulnerability": "VCID-6kvf-hsu3-nfc3"
                        },
                        {
                            "vulnerability": "VCID-6v51-g3b9-3qbf"
                        },
                        {
                            "vulnerability": "VCID-7sc8-fzw3-vfer"
                        },
                        {
                            "vulnerability": "VCID-7vbm-bp51-4faa"
                        },
                        {
                            "vulnerability": "VCID-84t7-666n-fydn"
                        },
                        {
                            "vulnerability": "VCID-88yz-vyfa-xuec"
                        },
                        {
                            "vulnerability": "VCID-8p5q-y7th-e7a3"
                        },
                        {
                            "vulnerability": "VCID-9v6f-mzak-87d6"
                        },
                        {
                            "vulnerability": "VCID-a6f4-kkt1-yugs"
                        },
                        {
                            "vulnerability": "VCID-b7k7-s2rd-j3h1"
                        },
                        {
                            "vulnerability": "VCID-bmef-m4dw-kbeu"
                        },
                        {
                            "vulnerability": "VCID-by8y-uamt-f7bt"
                        },
                        {
                            "vulnerability": "VCID-cjbb-xm4r-c3b5"
                        },
                        {
                            "vulnerability": "VCID-cxp6-cmpk-7uff"
                        },
                        {
                            "vulnerability": "VCID-dfhw-bvdv-4udd"
                        },
                        {
                            "vulnerability": "VCID-e8f4-9g99-6yet"
                        },
                        {
                            "vulnerability": "VCID-ek5t-65by-syac"
                        },
                        {
                            "vulnerability": "VCID-f47d-fm3y-q3b9"
                        },
                        {
                            "vulnerability": "VCID-ftkb-qtse-afhq"
                        },
                        {
                            "vulnerability": "VCID-fx6h-7q2k-5fd2"
                        },
                        {
                            "vulnerability": "VCID-hd32-zxxu-6bh4"
                        },
                        {
                            "vulnerability": "VCID-hsyc-q23j-2ua3"
                        },
                        {
                            "vulnerability": "VCID-j49e-hexk-7kgd"
                        },
                        {
                            "vulnerability": "VCID-jm7b-4gnb-uygv"
                        },
                        {
                            "vulnerability": "VCID-k4nr-2da1-jke3"
                        },
                        {
                            "vulnerability": "VCID-k6ey-kdwp-17ed"
                        },
                        {
                            "vulnerability": "VCID-kh2b-vdkt-nkep"
                        },
                        {
                            "vulnerability": "VCID-kvn8-qddz-vqag"
                        },
                        {
                            "vulnerability": "VCID-mtb5-2vq5-4yf7"
                        },
                        {
                            "vulnerability": "VCID-pejn-n3rz-33bs"
                        },
                        {
                            "vulnerability": "VCID-pjtw-r398-uqgw"
                        },
                        {
                            "vulnerability": "VCID-pkej-frsd-gqdk"
                        },
                        {
                            "vulnerability": "VCID-q1nv-rtqz-4fhk"
                        },
                        {
                            "vulnerability": "VCID-r1u7-ujc5-g7aw"
                        },
                        {
                            "vulnerability": "VCID-rcs3-znj9-pbb8"
                        },
                        {
                            "vulnerability": "VCID-rcxk-qvqu-y3fj"
                        },
                        {
                            "vulnerability": "VCID-sdx4-5wtj-hbf9"
                        },
                        {
                            "vulnerability": "VCID-syyt-ureu-23h8"
                        },
                        {
                            "vulnerability": "VCID-t9qr-esv2-g7he"
                        },
                        {
                            "vulnerability": "VCID-tcc9-936c-vkhk"
                        },
                        {
                            "vulnerability": "VCID-tmj2-8abu-fuen"
                        },
                        {
                            "vulnerability": "VCID-ugns-tvmf-e7c7"
                        },
                        {
                            "vulnerability": "VCID-uqym-35ay-uua8"
                        },
                        {
                            "vulnerability": "VCID-uv5p-15z7-fqcn"
                        },
                        {
                            "vulnerability": "VCID-vcgu-7pzk-2udx"
                        },
                        {
                            "vulnerability": "VCID-vj46-k8jn-a7ew"
                        },
                        {
                            "vulnerability": "VCID-vjrz-ss5c-skcc"
                        },
                        {
                            "vulnerability": "VCID-vwk2-2pwb-muhu"
                        },
                        {
                            "vulnerability": "VCID-wj3y-5jmt-7ugw"
                        },
                        {
                            "vulnerability": "VCID-x3kv-wwqy-8bav"
                        },
                        {
                            "vulnerability": "VCID-xdh7-9hu5-vfa6"
                        },
                        {
                            "vulnerability": "VCID-y2a1-fczv-k7e2"
                        },
                        {
                            "vulnerability": "VCID-ycgk-1xz6-h3fm"
                        },
                        {
                            "vulnerability": "VCID-z1d7-yjdv-hyh8"
                        },
                        {
                            "vulnerability": "VCID-znqk-35mz-dqfk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35.2-2"
                }
            ],
            "aliases": [
                "CVE-2021-20294"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58589?format=api",
            "vulnerability_id": "VCID-w17q-m7sf-23fx",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54537",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54598",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54645",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5464",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55957",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55994",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534",
                    "reference_id": "1661534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-20002"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49733?format=api",
            "vulnerability_id": "VCID-w6mz-3zaq-qffk",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5036",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50326",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50315",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5026",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50277",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50323",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00268",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50352",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24233"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K37121474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K37121474"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680662",
                    "reference_id": "1680662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680662"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9073",
                    "reference_id": "CVE-2019-9073",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9073"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9073"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6mz-3zaq-qffk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82930?format=api",
            "vulnerability_id": "VCID-xrfz-4jk8-auaw",
            "summary": "binutils: Integer overflow in load_specific_debug_section function",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29357",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29429",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29433",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29335",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29324",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29388",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24005"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11fa9f134fd658075c6f74499c780df045d9e9ca"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106457"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664712",
                    "reference_id": "1664712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664712"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671",
                    "reference_id": "CVE-2018-20671",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6413-1/",
                    "reference_id": "USN-6413-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6413-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-20671"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrfz-4jk8-auaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83130?format=api",
            "vulnerability_id": "VCID-xysa-jvv6-9yd6",
            "summary": "binutils: invalid memory access in bfd_zalloc in opncls.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17359.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54593",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5447",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54545",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54569",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54537",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54595",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54556",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17359"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632914",
                    "reference_id": "1632914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632914"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-17359"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xysa-jvv6-9yd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81703?format=api",
            "vulnerability_id": "VCID-yqu7-y3b9-gkg8",
            "summary": "binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35342.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29158",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29233",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29135",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29109",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29098",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29161",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35342"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35342"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233998",
                    "reference_id": "2233998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233998"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0009/",
                    "reference_id": "ntap-20231006-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231006-0009/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319",
                    "reference_id": "show_bug.cgi?id=25319",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:27Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6381-1/",
                    "reference_id": "USN-6381-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6381-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35342"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqu7-y3b9-gkg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49731?format=api",
            "vulnerability_id": "VCID-z6f9-bgge-wygt",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36245",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36364",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36344",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36322",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36436",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36468",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36352",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36372",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36379",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9071"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190314-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190314-0003/"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24227"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K02884135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K02884135"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/107147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/107147"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680657",
                    "reference_id": "1680657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1680657"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9071",
                    "reference_id": "CVE-2019-9071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9071"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2019-9071"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z6f9-bgge-wygt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49742?format=api",
            "vulnerability_id": "VCID-zcmh-czy1-xqca",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30854",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3098",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30903",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30934",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30936",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30893",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3088",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35495"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911441",
                    "reference_id": "1911441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911441"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-24",
                    "reference_id": "GLSA-202107-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2020-35495"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcmh-czy1-xqca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83131?format=api",
            "vulnerability_id": "VCID-zgnj-1jpn-nudx",
            "summary": "binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17360.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63048",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63107",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63137",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63101",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63188",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6315",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63185",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632921",
                    "reference_id": "1632921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632921"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050306?format=api",
                    "purl": "pkg:deb/debian/binutils@2.35-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vepg-jnnm-97d7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.35-2"
                }
            ],
            "aliases": [
                "CVE-2018-17360"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnj-1jpn-nudx"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/binutils@2.31.1-15"
}