Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-devel/binutils@2.30-r2
Typeebuild
Namespacesys-devel
Namebinutils
Version2.30-r2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.32-r1
Latest_non_vulnerable_version2.40
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-177z-wwk5-a7aw
vulnerability_id VCID-177z-wwk5-a7aw
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16826.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16826
reference_id
reference_type
scores
0
value 0.00336
scoring_system epss
scoring_elements 0.56352
published_at 2026-04-01T12:55:00Z
1
value 0.00336
scoring_system epss
scoring_elements 0.56511
published_at 2026-04-16T12:55:00Z
2
value 0.00336
scoring_system epss
scoring_elements 0.56521
published_at 2026-04-11T12:55:00Z
3
value 0.00336
scoring_system epss
scoring_elements 0.56496
published_at 2026-04-12T12:55:00Z
4
value 0.00336
scoring_system epss
scoring_elements 0.56478
published_at 2026-04-13T12:55:00Z
5
value 0.00336
scoring_system epss
scoring_elements 0.56451
published_at 2026-04-02T12:55:00Z
6
value 0.00336
scoring_system epss
scoring_elements 0.56473
published_at 2026-04-04T12:55:00Z
7
value 0.00336
scoring_system epss
scoring_elements 0.56454
published_at 2026-04-07T12:55:00Z
8
value 0.00336
scoring_system epss
scoring_elements 0.56505
published_at 2026-04-08T12:55:00Z
9
value 0.00336
scoring_system epss
scoring_elements 0.5651
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22376
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22376
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518589
reference_id 1518589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518589
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16826
reference_id CVE-2017-16826
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16826
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16826
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-177z-wwk5-a7aw
1
url VCID-1bdz-88dn-bka9
vulnerability_id VCID-1bdz-88dn-bka9
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16828.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16828
reference_id
reference_type
scores
0
value 0.00336
scoring_system epss
scoring_elements 0.56352
published_at 2026-04-01T12:55:00Z
1
value 0.00336
scoring_system epss
scoring_elements 0.56511
published_at 2026-04-16T12:55:00Z
2
value 0.00336
scoring_system epss
scoring_elements 0.56496
published_at 2026-04-12T12:55:00Z
3
value 0.00336
scoring_system epss
scoring_elements 0.56478
published_at 2026-04-13T12:55:00Z
4
value 0.00336
scoring_system epss
scoring_elements 0.56451
published_at 2026-04-02T12:55:00Z
5
value 0.00336
scoring_system epss
scoring_elements 0.56473
published_at 2026-04-04T12:55:00Z
6
value 0.00336
scoring_system epss
scoring_elements 0.56454
published_at 2026-04-07T12:55:00Z
7
value 0.00336
scoring_system epss
scoring_elements 0.56505
published_at 2026-04-08T12:55:00Z
8
value 0.00336
scoring_system epss
scoring_elements 0.5651
published_at 2026-04-09T12:55:00Z
9
value 0.00336
scoring_system epss
scoring_elements 0.56521
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16828
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22386
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22386
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518591
reference_id 1518591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518591
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16828
reference_id CVE-2017-16828
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16828
8
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16828
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bdz-88dn-bka9
2
url VCID-4qym-m5uk-xqae
vulnerability_id VCID-4qym-m5uk-xqae
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17121.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17121
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58542
published_at 2026-04-01T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58684
published_at 2026-04-16T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-09T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.5869
published_at 2026-04-11T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.5867
published_at 2026-04-12T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58651
published_at 2026-04-13T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.58626
published_at 2026-04-02T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58647
published_at 2026-04-04T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58614
published_at 2026-04-07T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58665
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17121
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22506
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22506
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524501
reference_id 1524501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524501
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17121
reference_id CVE-2017-17121
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17121
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17121
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qym-m5uk-xqae
3
url VCID-5t88-u264-z3gx
vulnerability_id VCID-5t88-u264-z3gx
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6872.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6872
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41867
published_at 2026-04-01T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41931
published_at 2026-04-02T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.4196
published_at 2026-04-04T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41886
published_at 2026-04-07T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41937
published_at 2026-04-08T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41948
published_at 2026-04-09T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41971
published_at 2026-04-11T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41935
published_at 2026-04-12T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41922
published_at 2026-04-13T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41972
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6872
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1543969
reference_id 1543969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1543969
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-6872
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5t88-u264-z3gx
4
url VCID-642t-uczn-3ke8
vulnerability_id VCID-642t-uczn-3ke8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7570.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7570.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7570
reference_id
reference_type
scores
0
value 0.00461
scoring_system epss
scoring_elements 0.64076
published_at 2026-04-01T12:55:00Z
1
value 0.00461
scoring_system epss
scoring_elements 0.64133
published_at 2026-04-02T12:55:00Z
2
value 0.00461
scoring_system epss
scoring_elements 0.6416
published_at 2026-04-13T12:55:00Z
3
value 0.00461
scoring_system epss
scoring_elements 0.6412
published_at 2026-04-07T12:55:00Z
4
value 0.00461
scoring_system epss
scoring_elements 0.64171
published_at 2026-04-08T12:55:00Z
5
value 0.00461
scoring_system epss
scoring_elements 0.64187
published_at 2026-04-09T12:55:00Z
6
value 0.00461
scoring_system epss
scoring_elements 0.642
published_at 2026-04-11T12:55:00Z
7
value 0.00461
scoring_system epss
scoring_elements 0.64189
published_at 2026-04-12T12:55:00Z
8
value 0.00461
scoring_system epss
scoring_elements 0.64196
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7570
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551785
reference_id 1551785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551785
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7570
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-642t-uczn-3ke8
5
url VCID-6aec-uvse-wub4
vulnerability_id VCID-6aec-uvse-wub4
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7569.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7569.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7569
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35027
published_at 2026-04-01T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35227
published_at 2026-04-02T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35136
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.3518
published_at 2026-04-08T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35206
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-11T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35175
published_at 2026-04-12T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35151
published_at 2026-04-13T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35189
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7569
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551778
reference_id 1551778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551778
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7569
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6aec-uvse-wub4
6
url VCID-6atd-3q2h-vfd5
vulnerability_id VCID-6atd-3q2h-vfd5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17123
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63291
published_at 2026-04-16T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63272
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63289
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.6329
published_at 2026-04-12T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63254
published_at 2026-04-13T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-02T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63255
published_at 2026-04-04T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.6322
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22509
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22509
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524509
reference_id 1524509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524509
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17123
reference_id CVE-2017-17123
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17123
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17123
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6atd-3q2h-vfd5
7
url VCID-b7ed-5vy7-8yb8
vulnerability_id VCID-b7ed-5vy7-8yb8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17124
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.5971
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59866
published_at 2026-04-16T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59777
published_at 2026-04-07T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59828
published_at 2026-04-13T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59842
published_at 2026-04-09T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59862
published_at 2026-04-11T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59846
published_at 2026-04-12T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59783
published_at 2026-04-02T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59807
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22507
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22507
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524510
reference_id 1524510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524510
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17124
reference_id CVE-2017-17124
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17124
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17124
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7ed-5vy7-8yb8
8
url VCID-ceka-mz2e-6ub5
vulnerability_id VCID-ceka-mz2e-6ub5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14933.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14933
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65689
published_at 2026-04-01T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65808
published_at 2026-04-16T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65797
published_at 2026-04-09T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65818
published_at 2026-04-11T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.65804
published_at 2026-04-12T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65773
published_at 2026-04-13T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65739
published_at 2026-04-02T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65769
published_at 2026-04-04T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65734
published_at 2026-04-07T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65786
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22210
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22210
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
6
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
7
reference_url http://www.securityfocus.com/bid/101203
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101203
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1500331
reference_id 1500331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1500331
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14933
reference_id CVE-2017-14933
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14933
11
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-14933
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ceka-mz2e-6ub5
9
url VCID-csfh-sngk-qfga
vulnerability_id VCID-csfh-sngk-qfga
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17126
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59278
published_at 2026-04-16T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-08T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59257
published_at 2026-04-09T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59277
published_at 2026-04-11T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.5926
published_at 2026-04-12T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-13T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59203
published_at 2026-04-02T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59227
published_at 2026-04-04T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59192
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22510
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22510
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524498
reference_id 1524498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524498
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17126
reference_id CVE-2017-17126
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17126
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17126
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-sngk-qfga
10
url VCID-cxtg-crnd-yfc1
vulnerability_id VCID-cxtg-crnd-yfc1
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16829.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16829
reference_id
reference_type
scores
0
value 0.00625
scoring_system epss
scoring_elements 0.70105
published_at 2026-04-01T12:55:00Z
1
value 0.00625
scoring_system epss
scoring_elements 0.70211
published_at 2026-04-16T12:55:00Z
2
value 0.00625
scoring_system epss
scoring_elements 0.70172
published_at 2026-04-09T12:55:00Z
3
value 0.00625
scoring_system epss
scoring_elements 0.70196
published_at 2026-04-11T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70181
published_at 2026-04-12T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70169
published_at 2026-04-13T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70117
published_at 2026-04-02T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70132
published_at 2026-04-04T12:55:00Z
8
value 0.00625
scoring_system epss
scoring_elements 0.70109
published_at 2026-04-07T12:55:00Z
9
value 0.00625
scoring_system epss
scoring_elements 0.70156
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22307
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22307
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518592
reference_id 1518592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518592
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16829
reference_id CVE-2017-16829
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16829
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16829
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxtg-crnd-yfc1
11
url VCID-eje9-1h51-x7h5
vulnerability_id VCID-eje9-1h51-x7h5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16831.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16831
reference_id
reference_type
scores
0
value 0.00336
scoring_system epss
scoring_elements 0.56352
published_at 2026-04-01T12:55:00Z
1
value 0.00336
scoring_system epss
scoring_elements 0.56511
published_at 2026-04-16T12:55:00Z
2
value 0.00336
scoring_system epss
scoring_elements 0.56521
published_at 2026-04-11T12:55:00Z
3
value 0.00336
scoring_system epss
scoring_elements 0.56496
published_at 2026-04-12T12:55:00Z
4
value 0.00336
scoring_system epss
scoring_elements 0.56478
published_at 2026-04-13T12:55:00Z
5
value 0.00336
scoring_system epss
scoring_elements 0.56451
published_at 2026-04-02T12:55:00Z
6
value 0.00336
scoring_system epss
scoring_elements 0.56473
published_at 2026-04-04T12:55:00Z
7
value 0.00336
scoring_system epss
scoring_elements 0.56454
published_at 2026-04-07T12:55:00Z
8
value 0.00336
scoring_system epss
scoring_elements 0.56505
published_at 2026-04-08T12:55:00Z
9
value 0.00336
scoring_system epss
scoring_elements 0.5651
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22385
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22385
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518595
reference_id 1518595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518595
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16831
reference_id CVE-2017-16831
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16831
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16831
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eje9-1h51-x7h5
12
url VCID-erxw-u9dr-tqhj
vulnerability_id VCID-erxw-u9dr-tqhj
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7568.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7568
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38388
published_at 2026-04-01T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38525
published_at 2026-04-02T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.3855
published_at 2026-04-04T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38413
published_at 2026-04-07T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38464
published_at 2026-04-08T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38471
published_at 2026-04-16T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38487
published_at 2026-04-11T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38449
published_at 2026-04-12T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38424
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7568
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551771
reference_id 1551771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551771
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7568
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-erxw-u9dr-tqhj
13
url VCID-ftnk-2drc-jkdw
vulnerability_id VCID-ftnk-2drc-jkdw
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17122
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62141
published_at 2026-04-01T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62296
published_at 2026-04-16T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62247
published_at 2026-04-08T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62265
published_at 2026-04-09T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62283
published_at 2026-04-11T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62273
published_at 2026-04-12T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62251
published_at 2026-04-13T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-02T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62231
published_at 2026-04-04T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62198
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22508
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22508
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524505
reference_id 1524505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524505
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17122
reference_id CVE-2017-17122
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17122
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/5341-1/
reference_id USN-5341-1
reference_type
scores
url https://usn.ubuntu.com/5341-1/
12
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17122
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnk-2drc-jkdw
14
url VCID-j2a9-2rzx-d3hk
vulnerability_id VCID-j2a9-2rzx-d3hk
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16827.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16827
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40694
published_at 2026-04-01T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40797
published_at 2026-04-16T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40806
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40772
published_at 2026-04-12T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40753
published_at 2026-04-13T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40778
published_at 2026-04-02T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40805
published_at 2026-04-04T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.4073
published_at 2026-04-07T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.4078
published_at 2026-04-08T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40788
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16827
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22306
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22306
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518590
reference_id 1518590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518590
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16827
reference_id CVE-2017-16827
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16827
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16827
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2a9-2rzx-d3hk
15
url VCID-nwvg-pf93-9qf3
vulnerability_id VCID-nwvg-pf93-9qf3
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7208.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7208
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42157
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42215
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42244
published_at 2026-04-09T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42185
published_at 2026-04-07T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42236
published_at 2026-04-08T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42267
published_at 2026-04-11T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.4223
published_at 2026-04-12T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42202
published_at 2026-04-13T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42253
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1546622
reference_id 1546622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1546622
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7208
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwvg-pf93-9qf3
16
url VCID-rw8n-aye7-bkcm
vulnerability_id VCID-rw8n-aye7-bkcm
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17080.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17080.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17080
reference_id
reference_type
scores
0
value 0.00391
scoring_system epss
scoring_elements 0.60027
published_at 2026-04-01T12:55:00Z
1
value 0.00391
scoring_system epss
scoring_elements 0.60191
published_at 2026-04-16T12:55:00Z
2
value 0.00391
scoring_system epss
scoring_elements 0.6017
published_at 2026-04-12T12:55:00Z
3
value 0.00391
scoring_system epss
scoring_elements 0.60152
published_at 2026-04-13T12:55:00Z
4
value 0.00391
scoring_system epss
scoring_elements 0.60105
published_at 2026-04-02T12:55:00Z
5
value 0.00391
scoring_system epss
scoring_elements 0.60129
published_at 2026-04-04T12:55:00Z
6
value 0.00391
scoring_system epss
scoring_elements 0.60098
published_at 2026-04-07T12:55:00Z
7
value 0.00391
scoring_system epss
scoring_elements 0.60148
published_at 2026-04-08T12:55:00Z
8
value 0.00391
scoring_system epss
scoring_elements 0.60162
published_at 2026-04-09T12:55:00Z
9
value 0.00391
scoring_system epss
scoring_elements 0.60184
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17080
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22421
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22421
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524478
reference_id 1524478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524478
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17080
reference_id CVE-2017-17080
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17080
7
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17080
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw8n-aye7-bkcm
17
url VCID-rzx8-ezze-kkhq
vulnerability_id VCID-rzx8-ezze-kkhq
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16830.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16830
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.49019
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49127
published_at 2026-04-16T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49103
published_at 2026-04-11T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49076
published_at 2026-04-12T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49054
published_at 2026-04-02T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49082
published_at 2026-04-13T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49035
published_at 2026-04-07T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.4909
published_at 2026-04-08T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49086
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16830
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22384
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22384
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
5
reference_url http://www.securityfocus.com/bid/101941
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101941
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518594
reference_id 1518594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518594
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16830
reference_id CVE-2017-16830
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16830
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16830
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzx8-ezze-kkhq
18
url VCID-stn9-gqqb-7kae
vulnerability_id VCID-stn9-gqqb-7kae
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17125
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59278
published_at 2026-04-16T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59244
published_at 2026-04-08T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59257
published_at 2026-04-09T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59277
published_at 2026-04-11T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.5926
published_at 2026-04-12T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59241
published_at 2026-04-13T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59203
published_at 2026-04-02T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59227
published_at 2026-04-04T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59192
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22443
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22443
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1524511
reference_id 1524511
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1524511
7
reference_url https://security.archlinux.org/AVG-538
reference_id AVG-538
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-538
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17125
reference_id CVE-2017-17125
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17125
10
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-17125
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stn9-gqqb-7kae
19
url VCID-syrv-np5v-kfem
vulnerability_id VCID-syrv-np5v-kfem
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8945.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8945
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.39991
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40138
published_at 2026-04-08T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40164
published_at 2026-04-04T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40085
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40151
published_at 2026-04-09T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40161
published_at 2026-04-11T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40123
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40104
published_at 2026-04-13T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560827
reference_id 1560827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560827
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-8945
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syrv-np5v-kfem
20
url VCID-uece-4ggf-1kez
vulnerability_id VCID-uece-4ggf-1kez
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6543.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6543
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3496
published_at 2026-04-01T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.3516
published_at 2026-04-02T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35188
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35067
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-08T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35138
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35142
published_at 2026-04-11T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35107
published_at 2026-04-12T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35083
published_at 2026-04-13T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35121
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542275
reference_id 1542275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542275
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
7
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-6543
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uece-4ggf-1kez
21
url VCID-wb3h-8p7x-xfd2
vulnerability_id VCID-wb3h-8p7x-xfd2
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16832.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16832.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16832
reference_id
reference_type
scores
0
value 0.00336
scoring_system epss
scoring_elements 0.56352
published_at 2026-04-01T12:55:00Z
1
value 0.00336
scoring_system epss
scoring_elements 0.56511
published_at 2026-04-16T12:55:00Z
2
value 0.00336
scoring_system epss
scoring_elements 0.56521
published_at 2026-04-11T12:55:00Z
3
value 0.00336
scoring_system epss
scoring_elements 0.56496
published_at 2026-04-12T12:55:00Z
4
value 0.00336
scoring_system epss
scoring_elements 0.56478
published_at 2026-04-13T12:55:00Z
5
value 0.00336
scoring_system epss
scoring_elements 0.56451
published_at 2026-04-02T12:55:00Z
6
value 0.00336
scoring_system epss
scoring_elements 0.56473
published_at 2026-04-04T12:55:00Z
7
value 0.00336
scoring_system epss
scoring_elements 0.56454
published_at 2026-04-07T12:55:00Z
8
value 0.00336
scoring_system epss
scoring_elements 0.56505
published_at 2026-04-08T12:55:00Z
9
value 0.00336
scoring_system epss
scoring_elements 0.5651
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16832
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=22373
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=22373
5
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518596
reference_id 1518596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518596
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16832
reference_id CVE-2017-16832
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16832
9
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2017-16832
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wb3h-8p7x-xfd2
22
url VCID-y38j-xss5-t7dv
vulnerability_id VCID-y38j-xss5-t7dv
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7642.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7642
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35189
published_at 2026-04-16T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35151
published_at 2026-04-13T12:55:00Z
2
value 0.00193
scoring_system epss
scoring_elements 0.41203
published_at 2026-04-02T12:55:00Z
3
value 0.00193
scoring_system epss
scoring_elements 0.41233
published_at 2026-04-04T12:55:00Z
4
value 0.00193
scoring_system epss
scoring_elements 0.4116
published_at 2026-04-07T12:55:00Z
5
value 0.00193
scoring_system epss
scoring_elements 0.41208
published_at 2026-04-08T12:55:00Z
6
value 0.00193
scoring_system epss
scoring_elements 0.41217
published_at 2026-04-09T12:55:00Z
7
value 0.00193
scoring_system epss
scoring_elements 0.41238
published_at 2026-04-11T12:55:00Z
8
value 0.00193
scoring_system epss
scoring_elements 0.41206
published_at 2026-04-12T12:55:00Z
9
value 0.00193
scoring_system epss
scoring_elements 0.4111
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553115
reference_id 1553115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553115
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7642
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y38j-xss5-t7dv
23
url VCID-yrdw-3w8u-myev
vulnerability_id VCID-yrdw-3w8u-myev
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6759.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6759
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39837
published_at 2026-04-16T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39787
published_at 2026-04-13T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46737
published_at 2026-04-02T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46757
published_at 2026-04-04T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46705
published_at 2026-04-07T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.4676
published_at 2026-04-08T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46759
published_at 2026-04-09T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46782
published_at 2026-04-11T12:55:00Z
8
value 0.00237
scoring_system epss
scoring_elements 0.46754
published_at 2026-04-12T12:55:00Z
9
value 0.00237
scoring_system epss
scoring_elements 0.46698
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1543244
reference_id 1543244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1543244
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-6759
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yrdw-3w8u-myev
24
url VCID-znum-gf7c-2fgh
vulnerability_id VCID-znum-gf7c-2fgh
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7643.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7643
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38645
published_at 2026-04-01T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38776
published_at 2026-04-08T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38797
published_at 2026-04-04T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38726
published_at 2026-04-07T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38787
published_at 2026-04-09T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38799
published_at 2026-04-11T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38763
published_at 2026-04-12T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38735
published_at 2026-04-13T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38781
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553119
reference_id 1553119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553119
5
reference_url https://security.gentoo.org/glsa/201811-17
reference_id GLSA-201811-17
reference_type
scores
url https://security.gentoo.org/glsa/201811-17
6
reference_url https://access.redhat.com/errata/RHSA-2018:3032
reference_id RHSA-2018:3032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3032
7
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.30-r2
purl pkg:ebuild/sys-devel/binutils@2.30-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2
aliases CVE-2018-7643
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znum-gf7c-2fgh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2