Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/71941?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "type": "ebuild", "namespace": "sys-devel", "name": "binutils", "version": "2.30-r2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.32-r1", "latest_non_vulnerable_version": "2.40", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31645?format=api", "vulnerability_id": "VCID-177z-wwk5-a7aw", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16826.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.5651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56478", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22376" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518589", "reference_id": "1518589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518589" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16826", "reference_id": "CVE-2017-16826", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16826" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16826" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-177z-wwk5-a7aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31647?format=api", "vulnerability_id": "VCID-1bdz-88dn-bka9", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16828.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.5651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56511", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22386" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518591", "reference_id": "1518591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518591" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16828", "reference_id": "CVE-2017-16828", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16828" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16828" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bdz-88dn-bka9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31654?format=api", "vulnerability_id": "VCID-4qym-m5uk-xqae", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17121.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58542", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58632", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58684", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58688", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58647", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58614", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5867", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22506" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524501", "reference_id": "1524501", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524501" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17121", "reference_id": "CVE-2017-17121", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17121" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17121" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qym-m5uk-xqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31662?format=api", "vulnerability_id": "VCID-5t88-u264-z3gx", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6872.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6872.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6872", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41867", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.4196", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41935", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41922", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41873", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00198", "scoring_system": "epss", "scoring_elements": "0.41811", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543969", "reference_id": "1543969", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543969" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-6872" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t88-u264-z3gx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31668?format=api", "vulnerability_id": "VCID-642t-uczn-3ke8", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7570.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7570.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7570", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64133", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.6416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.6412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64187", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64189", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64207", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64195", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00461", "scoring_system": "epss", "scoring_elements": "0.64215", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551785", "reference_id": "1551785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551785" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7570" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-642t-uczn-3ke8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31666?format=api", "vulnerability_id": "VCID-6aec-uvse-wub4", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7569.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7569.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35136", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3518", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35206", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35175", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34892", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551778", "reference_id": "1551778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551778" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7569" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6aec-uvse-wub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31656?format=api", "vulnerability_id": "VCID-6atd-3q2h-vfd5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17123.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63166", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6329", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63254", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63291", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63298", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63278", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63225", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22509" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524509", "reference_id": "1524509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524509" }, { "reference_url": "https://security.archlinux.org/AVG-538", "reference_id": "AVG-538", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-538" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17123", "reference_id": "CVE-2017-17123", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17123" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17123" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6atd-3q2h-vfd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31657?format=api", "vulnerability_id": "VCID-b7ed-5vy7-8yb8", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59857", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59866", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59872", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59777", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59828", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22507" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524510", "reference_id": "1524510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524510" }, { "reference_url": "https://security.archlinux.org/AVG-538", "reference_id": "AVG-538", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-538" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17124", "reference_id": "CVE-2017-17124", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17124" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17124" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7ed-5vy7-8yb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31644?format=api", "vulnerability_id": "VCID-ceka-mz2e-6ub5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14933.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14933.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.6582", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65804", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65773", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65769", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65818", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-14933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14933" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22210" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32" }, { "reference_url": "http://www.securityfocus.com/bid/101203", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101203" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500331", "reference_id": "1500331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500331" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14933", "reference_id": "CVE-2017-14933", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14933" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-14933" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ceka-mz2e-6ub5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31659?format=api", "vulnerability_id": "VCID-csfh-sngk-qfga", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59247", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.5926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59241", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59285", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59227", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59277", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22510" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524498", "reference_id": "1524498", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524498" }, { "reference_url": "https://security.archlinux.org/AVG-538", "reference_id": "AVG-538", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-538" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17126", "reference_id": "CVE-2017-17126", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17126" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17126" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-sngk-qfga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31649?format=api", "vulnerability_id": "VCID-cxtg-crnd-yfc1", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16829.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70251", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.7022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70199", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70132", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70156", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70196", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70181", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22307", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22307" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518592", "reference_id": "1518592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518592" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16829", "reference_id": "CVE-2017-16829", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16829" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16829" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cxtg-crnd-yfc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31651?format=api", "vulnerability_id": "VCID-eje9-1h51-x7h5", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16831.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16831.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16831", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.5651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56478", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22385" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518595", "reference_id": "1518595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518595" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16831", "reference_id": "CVE-2017-16831", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16831" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16831" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eje9-1h51-x7h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31665?format=api", "vulnerability_id": "VCID-erxw-u9dr-tqhj", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7568.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38525", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38464", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38451", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3823", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551771", "reference_id": "1551771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551771" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7568" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxw-u9dr-tqhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31655?format=api", "vulnerability_id": "VCID-ftnk-2drc-jkdw", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62141", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62273", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62303", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62288", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62231", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62198", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62247", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00426", "scoring_system": "epss", "scoring_elements": "0.62283", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22508" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524505", "reference_id": "1524505", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524505" }, { "reference_url": "https://security.archlinux.org/AVG-538", "reference_id": "AVG-538", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-538" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17122", "reference_id": "CVE-2017-17122", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17122" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/5341-1/", "reference_id": "USN-5341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5341-1/" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17122" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnk-2drc-jkdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31646?format=api", "vulnerability_id": "VCID-j2a9-2rzx-d3hk", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40694", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40592", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40797", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40688", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40778", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40806", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40753", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22306", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22306" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518590", "reference_id": "1518590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518590" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16827", "reference_id": "CVE-2017-16827", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16827" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16827" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2a9-2rzx-d3hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31663?format=api", "vulnerability_id": "VCID-nwvg-pf93-9qf3", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42236", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42202", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42253", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42159", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42106", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546622", "reference_id": "1546622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546622" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7208" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwvg-pf93-9qf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31653?format=api", "vulnerability_id": "VCID-rw8n-aye7-bkcm", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17080.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17080.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17080", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60191", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60162", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.6017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60152", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22421" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524478", "reference_id": "1524478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17080", "reference_id": "CVE-2017-17080", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17080" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17080" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rw8n-aye7-bkcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31650?format=api", "vulnerability_id": "VCID-rzx8-ezze-kkhq", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16830.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49079", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49035", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.4909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49103", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00257", "scoring_system": "epss", "scoring_elements": "0.49127", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16830" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4" }, { "reference_url": "http://www.securityfocus.com/bid/101941", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101941" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518594", "reference_id": "1518594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518594" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16830", "reference_id": "CVE-2017-16830", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16830" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16830" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzx8-ezze-kkhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31658?format=api", "vulnerability_id": "VCID-stn9-gqqb-7kae", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17125.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59247", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.5926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59241", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59285", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59227", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59277", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22443" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524511", "reference_id": "1524511", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524511" }, { "reference_url": "https://security.archlinux.org/AVG-538", "reference_id": "AVG-538", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-538" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17125", "reference_id": "CVE-2017-17125", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17125" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-17125" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stn9-gqqb-7kae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31671?format=api", "vulnerability_id": "VCID-syrv-np5v-kfem", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.39991", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40151", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40104", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.39874", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560827", "reference_id": "1560827", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560827" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-1/", "reference_id": "USN-4336-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-1/" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-8945" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syrv-np5v-kfem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31660?format=api", "vulnerability_id": "VCID-uece-4ggf-1kez", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3496", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35138", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35107", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35121", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35059", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34826", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542275", "reference_id": "1542275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542275" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" }, { "reference_url": "https://usn.ubuntu.com/6413-1/", "reference_id": "USN-6413-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6413-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-6543" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uece-4ggf-1kez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31652?format=api", "vulnerability_id": "VCID-wb3h-8p7x-xfd2", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16832.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16832.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16832", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56505", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.5651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00336", "scoring_system": "epss", "scoring_elements": "0.56478", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16832" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22373" }, { "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518596", "reference_id": "1518596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518596" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16832", "reference_id": "CVE-2017-16832", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16832" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2017-16832" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wb3h-8p7x-xfd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31669?format=api", "vulnerability_id": "VCID-y38j-xss5-t7dv", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7642.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7642.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7642", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34892", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35189", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35175", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.4116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41206", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.4111", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41233", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553115", "reference_id": "1553115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553115" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7642" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y38j-xss5-t7dv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31661?format=api", "vulnerability_id": "VCID-yrdw-3w8u-myev", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6759.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6759.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6759", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39546", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39787", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39809", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46705", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46698", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.4676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46737", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00237", "scoring_system": "epss", "scoring_elements": "0.46757", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543244", "reference_id": "1543244", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543244" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-6759" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yrdw-3w8u-myev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31670?format=api", "vulnerability_id": "VCID-znum-gf7c-2fgh", "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n which may allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38776", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38797", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38799", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38679", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38522", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553119", "reference_id": "1553119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553119" }, { "reference_url": "https://security.gentoo.org/glsa/201811-17", "reference_id": "GLSA-201811-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032", "reference_id": "RHSA-2018:3032", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3032" }, { "reference_url": "https://usn.ubuntu.com/4336-2/", "reference_id": "USN-4336-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4336-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71941?format=api", "purl": "pkg:ebuild/sys-devel/binutils@2.30-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" } ], "aliases": [ "CVE-2018-7643" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-znum-gf7c-2fgh" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.30-r2" }