Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/binutils@2.28.0-4
Typealpm
Namespacearchlinux
Namebinutils
Version2.28.0-4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.29.0-1
Latest_non_vulnerable_version2.38-1
Affected_by_vulnerabilities
0
url VCID-1rp7-5hxs-tqbx
vulnerability_id VCID-1rp7-5hxs-tqbx
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6965
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48609
published_at 2026-04-01T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48674
published_at 2026-04-09T12:55:00Z
2
value 0.00254
scoring_system epss
scoring_elements 0.4865
published_at 2026-04-02T12:55:00Z
3
value 0.00254
scoring_system epss
scoring_elements 0.48672
published_at 2026-04-04T12:55:00Z
4
value 0.00254
scoring_system epss
scoring_elements 0.48624
published_at 2026-04-07T12:55:00Z
5
value 0.00254
scoring_system epss
scoring_elements 0.48678
published_at 2026-04-08T12:55:00Z
6
value 0.00254
scoring_system epss
scoring_elements 0.48692
published_at 2026-04-11T12:55:00Z
7
value 0.00254
scoring_system epss
scoring_elements 0.48666
published_at 2026-04-12T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.5254
published_at 2026-04-24T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52557
published_at 2026-04-13T12:55:00Z
10
value 0.00292
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-16T12:55:00Z
11
value 0.00292
scoring_system epss
scoring_elements 0.52604
published_at 2026-04-18T12:55:00Z
12
value 0.00292
scoring_system epss
scoring_elements 0.52589
published_at 2026-04-21T12:55:00Z
13
value 0.00292
scoring_system epss
scoring_elements 0.5255
published_at 2026-04-26T12:55:00Z
14
value 0.00292
scoring_system epss
scoring_elements 0.52513
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21137
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21137
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435640
reference_id 1435640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435640
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264
reference_id 858264
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6965
reference_id CVE-2017-6965
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6965
10
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-6965
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rp7-5hxs-tqbx
1
url VCID-4ty8-8ecg-mqdy
vulnerability_id VCID-4ty8-8ecg-mqdy
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7209.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7209
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.5447
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.5453
published_at 2026-04-29T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-21T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54536
published_at 2026-04-24T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54551
published_at 2026-04-26T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54545
published_at 2026-04-02T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54569
published_at 2026-04-04T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54537
published_at 2026-04-07T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54589
published_at 2026-04-08T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54583
published_at 2026-04-09T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54595
published_at 2026-04-18T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-12T12:55:00Z
12
value 0.00314
scoring_system epss
scoring_elements 0.54556
published_at 2026-04-13T12:55:00Z
13
value 0.00314
scoring_system epss
scoring_elements 0.54593
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21135
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21135
4
reference_url http://www.securityfocus.com/bid/96994
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96994
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435632
reference_id 1435632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435632
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858323
reference_id 858323
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858323
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7209
reference_id CVE-2017-7209
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7209
10
reference_url https://security.gentoo.org/glsa/201801-01
reference_id GLSA-201801-01
reference_type
scores
url https://security.gentoo.org/glsa/201801-01
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-7209
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty8-8ecg-mqdy
2
url VCID-5cxe-ara7-jfcr
vulnerability_id VCID-5cxe-ara7-jfcr
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9041
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-01T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65264
published_at 2026-04-29T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65256
published_at 2026-04-18T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65253
published_at 2026-04-24T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65266
published_at 2026-04-26T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.6518
published_at 2026-04-02T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65205
published_at 2026-04-04T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65171
published_at 2026-04-07T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65221
published_at 2026-04-08T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-09T12:55:00Z
10
value 0.00483
scoring_system epss
scoring_elements 0.65251
published_at 2026-04-11T12:55:00Z
11
value 0.00483
scoring_system epss
scoring_elements 0.65239
published_at 2026-04-21T12:55:00Z
12
value 0.00483
scoring_system epss
scoring_elements 0.65211
published_at 2026-04-13T12:55:00Z
13
value 0.00483
scoring_system epss
scoring_elements 0.65246
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9041
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452171
reference_id 1452171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452171
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9041
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cxe-ara7-jfcr
3
url VCID-b5je-gm19-yba5
vulnerability_id VCID-b5je-gm19-yba5
summary binutils: Out-of-bounds read in the print_symbol_for_build_attribute function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9044.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9044
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54756
published_at 2026-04-29T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54763
published_at 2026-04-13T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54801
published_at 2026-04-16T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-18T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54785
published_at 2026-04-21T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54758
published_at 2026-04-24T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54778
published_at 2026-04-26T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.6201
published_at 2026-04-11T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.61999
published_at 2026-04-12T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.61848
published_at 2026-04-01T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.61971
published_at 2026-04-08T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.61988
published_at 2026-04-09T12:55:00Z
12
value 0.00421
scoring_system epss
scoring_elements 0.61921
published_at 2026-04-07T12:55:00Z
13
value 0.00421
scoring_system epss
scoring_elements 0.61951
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452176
reference_id 1452176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452176
5
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9044
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5je-gm19-yba5
4
url VCID-dyx7-6xgz-mqa7
vulnerability_id VCID-dyx7-6xgz-mqa7
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9038
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57909
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58008
published_at 2026-04-26T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-21T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-29T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.57993
published_at 2026-04-02T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58013
published_at 2026-04-04T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.57988
published_at 2026-04-07T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58043
published_at 2026-04-08T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-09T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58063
published_at 2026-04-11T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-12T12:55:00Z
11
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
12
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
13
value 0.00358
scoring_system epss
scoring_elements 0.5805
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452167
reference_id 1452167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9038
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyx7-6xgz-mqa7
5
url VCID-j2wc-yxrx-4kh6
vulnerability_id VCID-j2wc-yxrx-4kh6
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9040
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.58008
published_at 2026-04-26T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.5805
published_at 2026-04-18T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-21T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-29T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64782
published_at 2026-04-04T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64795
published_at 2026-04-08T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64809
published_at 2026-04-09T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64826
published_at 2026-04-11T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64816
published_at 2026-04-12T12:55:00Z
11
value 0.00475
scoring_system epss
scoring_elements 0.64702
published_at 2026-04-01T12:55:00Z
12
value 0.00475
scoring_system epss
scoring_elements 0.64754
published_at 2026-04-02T12:55:00Z
13
value 0.00475
scoring_system epss
scoring_elements 0.64745
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9040
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452169
reference_id 1452169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452169
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9040
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wc-yxrx-4kh6
6
url VCID-kzqn-frns-jyab
vulnerability_id VCID-kzqn-frns-jyab
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6966
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51154
published_at 2026-04-01T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51193
published_at 2026-04-29T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51275
published_at 2026-04-21T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51223
published_at 2026-04-24T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51231
published_at 2026-04-26T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51207
published_at 2026-04-02T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51232
published_at 2026-04-04T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51191
published_at 2026-04-07T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51246
published_at 2026-04-08T12:55:00Z
9
value 0.00278
scoring_system epss
scoring_elements 0.51243
published_at 2026-04-09T12:55:00Z
10
value 0.00278
scoring_system epss
scoring_elements 0.51287
published_at 2026-04-11T12:55:00Z
11
value 0.00278
scoring_system epss
scoring_elements 0.51265
published_at 2026-04-12T12:55:00Z
12
value 0.00278
scoring_system epss
scoring_elements 0.51251
published_at 2026-04-13T12:55:00Z
13
value 0.00278
scoring_system epss
scoring_elements 0.5129
published_at 2026-04-16T12:55:00Z
14
value 0.00278
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21139
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21139
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435646
reference_id 1435646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435646
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263
reference_id 858263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6966
reference_id CVE-2017-6966
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6966
9
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-6966
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzqn-frns-jyab
7
url VCID-mgmr-bkuv-sbba
vulnerability_id VCID-mgmr-bkuv-sbba
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7210.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7210
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.5447
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.5453
published_at 2026-04-29T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54572
published_at 2026-04-21T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54536
published_at 2026-04-24T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54551
published_at 2026-04-26T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54545
published_at 2026-04-02T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54569
published_at 2026-04-04T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54537
published_at 2026-04-07T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54589
published_at 2026-04-08T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54583
published_at 2026-04-09T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54595
published_at 2026-04-18T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-12T12:55:00Z
12
value 0.00314
scoring_system epss
scoring_elements 0.54556
published_at 2026-04-13T12:55:00Z
13
value 0.00314
scoring_system epss
scoring_elements 0.54593
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21157
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21157
4
reference_url http://www.securityfocus.com/bid/96992
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96992
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435634
reference_id 1435634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435634
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858324
reference_id 858324
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858324
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7210
reference_id CVE-2017-7210
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7210
10
reference_url https://security.gentoo.org/glsa/201801-01
reference_id GLSA-201801-01
reference_type
scores
url https://security.gentoo.org/glsa/201801-01
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-7210
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgmr-bkuv-sbba
8
url VCID-n93p-dptt-r3hg
vulnerability_id VCID-n93p-dptt-r3hg
summary binutils: Shift exponent too large for type unsigned long in readelf.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9043.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9043
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60219
published_at 2026-04-01T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60295
published_at 2026-04-02T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.6032
published_at 2026-04-04T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60288
published_at 2026-04-07T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60338
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60354
published_at 2026-04-09T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60375
published_at 2026-04-11T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60361
published_at 2026-04-12T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64683
published_at 2026-04-29T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64622
published_at 2026-04-13T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.64658
published_at 2026-04-16T12:55:00Z
11
value 0.00471
scoring_system epss
scoring_elements 0.6467
published_at 2026-04-18T12:55:00Z
12
value 0.00471
scoring_system epss
scoring_elements 0.64656
published_at 2026-04-21T12:55:00Z
13
value 0.00471
scoring_system epss
scoring_elements 0.64675
published_at 2026-04-24T12:55:00Z
14
value 0.00471
scoring_system epss
scoring_elements 0.64687
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9043
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9043
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452175
reference_id 1452175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452175
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
5
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9043
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n93p-dptt-r3hg
9
url VCID-qnnr-5t4r-xfdc
vulnerability_id VCID-qnnr-5t4r-xfdc
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6969
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63894
published_at 2026-04-29T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63879
published_at 2026-04-18T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63884
published_at 2026-04-24T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63897
published_at 2026-04-26T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63816
published_at 2026-04-02T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63842
published_at 2026-04-04T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63799
published_at 2026-04-07T12:55:00Z
8
value 0.00455
scoring_system epss
scoring_elements 0.6385
published_at 2026-04-08T12:55:00Z
9
value 0.00455
scoring_system epss
scoring_elements 0.63868
published_at 2026-04-21T12:55:00Z
10
value 0.00455
scoring_system epss
scoring_elements 0.63881
published_at 2026-04-11T12:55:00Z
11
value 0.00455
scoring_system epss
scoring_elements 0.63867
published_at 2026-04-12T12:55:00Z
12
value 0.00455
scoring_system epss
scoring_elements 0.63834
published_at 2026-04-13T12:55:00Z
13
value 0.00455
scoring_system epss
scoring_elements 0.6387
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21156
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21156
4
reference_url http://www.securityfocus.com/bid/97065
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97065
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435648
reference_id 1435648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435648
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256
reference_id 858256
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6969
reference_id CVE-2017-6969
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6969
10
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-6969
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnnr-5t4r-xfdc
10
url VCID-qv6w-s2tv-eyfs
vulnerability_id VCID-qv6w-s2tv-eyfs
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9039
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57909
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58008
published_at 2026-04-26T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.5805
published_at 2026-04-18T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-21T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.57991
published_at 2026-04-29T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.57993
published_at 2026-04-02T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58013
published_at 2026-04-04T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.57988
published_at 2026-04-07T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58043
published_at 2026-04-08T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-09T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58063
published_at 2026-04-11T12:55:00Z
11
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-12T12:55:00Z
12
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
13
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9039
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452168
reference_id 1452168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452168
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9039
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv6w-s2tv-eyfs
11
url VCID-z7m5-hqbr-abc2
vulnerability_id VCID-z7m5-hqbr-abc2
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9042
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60219
published_at 2026-04-01T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60359
published_at 2026-04-29T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60381
published_at 2026-04-21T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60357
published_at 2026-04-24T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60372
published_at 2026-04-26T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60295
published_at 2026-04-02T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.6032
published_at 2026-04-04T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60288
published_at 2026-04-07T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60338
published_at 2026-04-08T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60354
published_at 2026-04-09T12:55:00Z
10
value 0.00395
scoring_system epss
scoring_elements 0.60375
published_at 2026-04-11T12:55:00Z
11
value 0.00395
scoring_system epss
scoring_elements 0.60361
published_at 2026-04-12T12:55:00Z
12
value 0.00395
scoring_system epss
scoring_elements 0.60342
published_at 2026-04-13T12:55:00Z
13
value 0.00395
scoring_system epss
scoring_elements 0.60383
published_at 2026-04-16T12:55:00Z
14
value 0.00395
scoring_system epss
scoring_elements 0.60392
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452173
reference_id 1452173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452173
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:alpm/archlinux/binutils@2.29.0-1
purl pkg:alpm/archlinux/binutils@2.29.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
aliases CVE-2017-9042
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7m5-hqbr-abc2
Fixing_vulnerabilities
Risk_score4.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.28.0-4