Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-devel/binutils@2.35.2
Typeebuild
Namespacesys-devel
Namebinutils
Version2.35.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.38
Latest_non_vulnerable_version2.40
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-355u-uwc8-kfap
vulnerability_id VCID-355u-uwc8-kfap
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9070
reference_id
reference_type
scores
0
value 0.00451
scoring_system epss
scoring_elements 0.63618
published_at 2026-04-01T12:55:00Z
1
value 0.00451
scoring_system epss
scoring_elements 0.63729
published_at 2026-04-21T12:55:00Z
2
value 0.00451
scoring_system epss
scoring_elements 0.63733
published_at 2026-04-16T12:55:00Z
3
value 0.00451
scoring_system epss
scoring_elements 0.63743
published_at 2026-04-18T12:55:00Z
4
value 0.00451
scoring_system epss
scoring_elements 0.63677
published_at 2026-04-02T12:55:00Z
5
value 0.00451
scoring_system epss
scoring_elements 0.63703
published_at 2026-04-04T12:55:00Z
6
value 0.00451
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-07T12:55:00Z
7
value 0.00451
scoring_system epss
scoring_elements 0.63715
published_at 2026-04-08T12:55:00Z
8
value 0.00451
scoring_system epss
scoring_elements 0.63732
published_at 2026-04-12T12:55:00Z
9
value 0.00451
scoring_system epss
scoring_elements 0.63746
published_at 2026-04-11T12:55:00Z
10
value 0.00451
scoring_system epss
scoring_elements 0.63698
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9070
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9070
3
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89395
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24229
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24229
6
reference_url https://support.f5.com/csp/article/K13534168
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K13534168
7
reference_url http://www.securityfocus.com/bid/107147
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107147
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680651
reference_id 1680651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680651
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9070
reference_id CVE-2019-9070
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9070
15
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
16
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9070
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-355u-uwc8-kfap
1
url VCID-3v94-m5uz-kyg5
vulnerability_id VCID-3v94-m5uz-kyg5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35507
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42713
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42616
published_at 2026-04-01T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42686
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45691
published_at 2026-04-11T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45661
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.4572
published_at 2026-04-16T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-18T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45664
published_at 2026-04-21T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-07T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45673
published_at 2026-04-08T12:55:00Z
10
value 0.00229
scoring_system epss
scoring_elements 0.45669
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911691
reference_id 1911691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911691
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35507
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v94-m5uz-kyg5
2
url VCID-7sc8-fzw3-vfer
vulnerability_id VCID-7sc8-fzw3-vfer
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35448
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32892
published_at 2026-04-02T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32762
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32927
published_at 2026-04-04T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55682
published_at 2026-04-21T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55699
published_at 2026-04-16T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55703
published_at 2026-04-18T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55634
published_at 2026-04-07T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55686
published_at 2026-04-08T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-09T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55697
published_at 2026-04-11T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.55678
published_at 2026-04-12T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.5566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950478
reference_id 1950478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950478
5
reference_url https://security.archlinux.org/AVG-1385
reference_id AVG-1385
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1385
6
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
7
reference_url https://access.redhat.com/errata/RHSA-2021:4364
reference_id RHSA-2021:4364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4364
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35448
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer
3
url VCID-8k17-exgp-8kb6
vulnerability_id VCID-8k17-exgp-8kb6
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35496
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42713
published_at 2026-04-04T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42616
published_at 2026-04-01T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42686
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45691
published_at 2026-04-11T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45661
published_at 2026-04-12T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.4572
published_at 2026-04-16T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-18T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45664
published_at 2026-04-21T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-07T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.45673
published_at 2026-04-08T12:55:00Z
10
value 0.00229
scoring_system epss
scoring_elements 0.45669
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911444
reference_id 1911444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911444
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35496
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k17-exgp-8kb6
4
url VCID-awuy-3kcy-zyev
vulnerability_id VCID-awuy-3kcy-zyev
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9074.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9074
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25059
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24964
published_at 2026-04-21T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24999
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-18T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25142
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25182
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25067
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25082
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.25041
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9074
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24235
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24235
8
reference_url https://support.f5.com/csp/article/K09092524
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K09092524
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680665
reference_id 1680665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680665
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9074
reference_id CVE-2019-9074
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9074
15
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
16
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
17
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9074
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awuy-3kcy-zyev
5
url VCID-ckh9-wqe3-euhu
vulnerability_id VCID-ckh9-wqe3-euhu
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35493
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42855
published_at 2026-04-21T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.4292
published_at 2026-04-11T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42868
published_at 2026-04-13T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42929
published_at 2026-04-16T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42917
published_at 2026-04-18T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42835
published_at 2026-04-07T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42885
published_at 2026-04-12T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42898
published_at 2026-04-09T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45503
published_at 2026-04-02T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45525
published_at 2026-04-04T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45428
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911437
reference_id 1911437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911437
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35493
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckh9-wqe3-euhu
6
url VCID-d3ch-k2y1-mybq
vulnerability_id VCID-d3ch-k2y1-mybq
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9076.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9076
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29713
published_at 2026-04-21T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29778
published_at 2026-04-16T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29757
published_at 2026-04-18T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29841
published_at 2026-04-01T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29886
published_at 2026-04-02T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29934
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29749
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29811
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29846
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29855
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29809
published_at 2026-04-12T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29759
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9076
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24238
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24238
5
reference_url https://support.f5.com/csp/article/K44650639
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K44650639
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680672
reference_id 1680672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9076
reference_id CVE-2019-9076
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9076
10
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9076
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ch-k2y1-mybq
7
url VCID-gws5-9vy4-vqa1
vulnerability_id VCID-gws5-9vy4-vqa1
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9075.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9075
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50743
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50864
published_at 2026-04-21T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50857
published_at 2026-04-12T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50841
published_at 2026-04-13T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50885
published_at 2026-04-18T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.508
published_at 2026-04-02T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50825
published_at 2026-04-04T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50783
published_at 2026-04-07T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50839
published_at 2026-04-08T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50838
published_at 2026-04-09T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50879
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24236
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24236
8
reference_url https://support.f5.com/csp/article/K42059040
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K42059040
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680669
reference_id 1680669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680669
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_webaccelerator:14.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9075
reference_id CVE-2019-9075
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9075
41
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
42
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
43
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9075
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gws5-9vy4-vqa1
8
url VCID-hbpa-49pk-67dy
vulnerability_id VCID-hbpa-49pk-67dy
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35494
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29847
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29892
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.2994
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29752
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29814
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29858
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29812
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29762
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29781
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29716
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911439
reference_id 1911439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911439
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35494
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbpa-49pk-67dy
9
url VCID-pwzu-d55f-nqb5
vulnerability_id VCID-pwzu-d55f-nqb5
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9077.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9077
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52666
published_at 2026-04-01T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52794
published_at 2026-04-21T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52766
published_at 2026-04-13T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52804
published_at 2026-04-16T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52811
published_at 2026-04-18T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52711
published_at 2026-04-02T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52737
published_at 2026-04-04T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52702
published_at 2026-04-07T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52753
published_at 2026-04-08T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52748
published_at 2026-04-09T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52799
published_at 2026-04-11T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.52782
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9077
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
7
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24243
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24243
8
reference_url https://support.f5.com/csp/article/K00056379
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K00056379
9
reference_url http://www.securityfocus.com/bid/107139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107139
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680675
reference_id 1680675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680675
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9077
reference_id CVE-2019-9077
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9077
16
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
17
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
18
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9077
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwzu-d55f-nqb5
10
url VCID-u53z-frse-83ew
vulnerability_id VCID-u53z-frse-83ew
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9072
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35883
published_at 2026-04-21T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35933
published_at 2026-04-18T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35836
published_at 2026-04-01T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.36026
published_at 2026-04-02T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.36056
published_at 2026-04-04T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35889
published_at 2026-04-07T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35939
published_at 2026-04-08T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35963
published_at 2026-04-09T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35969
published_at 2026-04-11T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.3593
published_at 2026-04-12T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35906
published_at 2026-04-13T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35946
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9072
2
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89396
3
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24232
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24232
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24237
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24237
6
reference_url https://support.f5.com/csp/article/K12541829
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K12541829
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680660
reference_id 1680660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680660
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9072
reference_id CVE-2019-9072
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9072
12
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9072
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u53z-frse-83ew
11
url VCID-vg1p-94wz-5ua8
vulnerability_id VCID-vg1p-94wz-5ua8
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-19599
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg1p-94wz-5ua8
12
url VCID-w6mz-3zaq-qffk
vulnerability_id VCID-w6mz-3zaq-qffk
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9073.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9073
reference_id
reference_type
scores
0
value 0.00268
scoring_system epss
scoring_elements 0.50338
published_at 2026-04-21T12:55:00Z
1
value 0.00268
scoring_system epss
scoring_elements 0.5036
published_at 2026-04-16T12:55:00Z
2
value 0.00268
scoring_system epss
scoring_elements 0.50363
published_at 2026-04-18T12:55:00Z
3
value 0.00268
scoring_system epss
scoring_elements 0.5026
published_at 2026-04-01T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.503
published_at 2026-04-02T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50329
published_at 2026-04-04T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50277
published_at 2026-04-07T12:55:00Z
7
value 0.00268
scoring_system epss
scoring_elements 0.5033
published_at 2026-04-08T12:55:00Z
8
value 0.00268
scoring_system epss
scoring_elements 0.50323
published_at 2026-04-09T12:55:00Z
9
value 0.00268
scoring_system epss
scoring_elements 0.50352
published_at 2026-04-11T12:55:00Z
10
value 0.00268
scoring_system epss
scoring_elements 0.50326
published_at 2026-04-12T12:55:00Z
11
value 0.00268
scoring_system epss
scoring_elements 0.50315
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9073
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24233
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24233
6
reference_url https://support.f5.com/csp/article/K37121474
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K37121474
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680662
reference_id 1680662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680662
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9073
reference_id CVE-2019-9073
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9073
13
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
14
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
15
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9073
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6mz-3zaq-qffk
13
url VCID-z6f9-bgge-wygt
vulnerability_id VCID-z6f9-bgge-wygt
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9071.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9071
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36245
published_at 2026-04-01T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36293
published_at 2026-04-21T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36364
published_at 2026-04-16T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36347
published_at 2026-04-18T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36436
published_at 2026-04-02T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36468
published_at 2026-04-04T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36303
published_at 2026-04-07T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-08T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36372
published_at 2026-04-09T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36379
published_at 2026-04-11T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36344
published_at 2026-04-12T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36322
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9071
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9071
3
reference_url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
reference_id
reference_type
scores
url https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89394
4
reference_url https://security.netapp.com/advisory/ntap-20190314-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190314-0003/
5
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24227
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24227
6
reference_url https://support.f5.com/csp/article/K02884135
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K02884135
7
reference_url http://www.securityfocus.com/bid/107147
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107147
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1680657
reference_id 1680657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1680657
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9071
reference_id CVE-2019-9071
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9071
16
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
17
reference_url https://usn.ubuntu.com/4326-1/
reference_id USN-4326-1
reference_type
scores
url https://usn.ubuntu.com/4326-1/
18
reference_url https://usn.ubuntu.com/4336-1/
reference_id USN-4336-1
reference_type
scores
url https://usn.ubuntu.com/4336-1/
19
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2019-9071
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6f9-bgge-wygt
14
url VCID-zcmh-czy1-xqca
vulnerability_id VCID-zcmh-czy1-xqca
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35495
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30854
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.3098
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31027
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30845
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30903
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30934
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30936
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30893
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30849
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30859
published_at 2026-04-18T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30825
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1911441
reference_id 1911441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1911441
5
reference_url https://security.gentoo.org/glsa/202107-24
reference_id GLSA-202107-24
reference_type
scores
url https://security.gentoo.org/glsa/202107-24
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.35.2
purl pkg:ebuild/sys-devel/binutils@2.35.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2
aliases CVE-2020-35495
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcmh-czy1-xqca
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.35.2