Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-devel/binutils@2.28.1
Typeebuild
Namespacesys-devel
Namebinutils
Version2.28.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.29.1-r1
Latest_non_vulnerable_version2.40
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1rp7-5hxs-tqbx
vulnerability_id VCID-1rp7-5hxs-tqbx
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6965
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48609
published_at 2026-04-01T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48672
published_at 2026-04-04T12:55:00Z
2
value 0.00254
scoring_system epss
scoring_elements 0.4865
published_at 2026-04-02T12:55:00Z
3
value 0.00254
scoring_system epss
scoring_elements 0.48624
published_at 2026-04-07T12:55:00Z
4
value 0.00254
scoring_system epss
scoring_elements 0.48678
published_at 2026-04-08T12:55:00Z
5
value 0.00254
scoring_system epss
scoring_elements 0.48674
published_at 2026-04-09T12:55:00Z
6
value 0.00254
scoring_system epss
scoring_elements 0.48692
published_at 2026-04-11T12:55:00Z
7
value 0.00254
scoring_system epss
scoring_elements 0.48666
published_at 2026-04-12T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52557
published_at 2026-04-13T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21137
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21137
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435640
reference_id 1435640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435640
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264
reference_id 858264
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6965
reference_id CVE-2017-6965
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6965
10
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-6965
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rp7-5hxs-tqbx
1
url VCID-2mve-frvh-9uf1
vulnerability_id VCID-2mve-frvh-9uf1
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8421.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8421
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24953
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24893
published_at 2026-04-16T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24975
published_at 2026-04-11T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24935
published_at 2026-04-12T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.2488
published_at 2026-04-13T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.2507
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24846
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24913
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21440
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21440
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449555
reference_id 1449555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449555
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8421
reference_id CVE-2017-8421
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8421
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
10
reference_url https://usn.ubuntu.com/6413-1/
reference_id USN-6413-1
reference_type
scores
url https://usn.ubuntu.com/6413-1/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8421
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2mve-frvh-9uf1
2
url VCID-5cxe-ara7-jfcr
vulnerability_id VCID-5cxe-ara7-jfcr
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9041
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-01T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65246
published_at 2026-04-16T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65251
published_at 2026-04-11T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65239
published_at 2026-04-12T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65211
published_at 2026-04-13T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.6518
published_at 2026-04-02T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65205
published_at 2026-04-04T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65171
published_at 2026-04-07T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65221
published_at 2026-04-08T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9041
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452171
reference_id 1452171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452171
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9041
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cxe-ara7-jfcr
3
url VCID-7cp4-dcw6-1bgb
vulnerability_id VCID-7cp4-dcw6-1bgb
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9742.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9742
reference_id
reference_type
scores
0
value 0.01735
scoring_system epss
scoring_elements 0.82508
published_at 2026-04-16T12:55:00Z
1
value 0.01959
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-13T12:55:00Z
2
value 0.02696
scoring_system epss
scoring_elements 0.85813
published_at 2026-04-02T12:55:00Z
3
value 0.02696
scoring_system epss
scoring_elements 0.85832
published_at 2026-04-04T12:55:00Z
4
value 0.02696
scoring_system epss
scoring_elements 0.85835
published_at 2026-04-07T12:55:00Z
5
value 0.02696
scoring_system epss
scoring_elements 0.85854
published_at 2026-04-08T12:55:00Z
6
value 0.02696
scoring_system epss
scoring_elements 0.85864
published_at 2026-04-09T12:55:00Z
7
value 0.02696
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-11T12:55:00Z
8
value 0.02696
scoring_system epss
scoring_elements 0.85876
published_at 2026-04-12T12:55:00Z
9
value 0.02696
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1469284
reference_id 1469284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1469284
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42203.txt
reference_id CVE-2017-9742
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42203.txt
6
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21576
reference_id CVE-2017-9742
reference_type exploit
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21576
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
9
reference_url https://usn.ubuntu.com/4336-3/
reference_id USN-4336-3
reference_type
scores
url https://usn.ubuntu.com/4336-3/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9742
risk_score 6.0
exploitability 2.0
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cp4-dcw6-1bgb
4
url VCID-d1vd-wk2z-cubz
vulnerability_id VCID-d1vd-wk2z-cubz
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8396.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8396
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-01T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-16T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-11T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59474
published_at 2026-04-12T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59455
published_at 2026-04-13T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59417
published_at 2026-04-02T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59441
published_at 2026-04-04T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-07T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59458
published_at 2026-04-08T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59471
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8396
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21432
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21432
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449550
reference_id 1449550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449550
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8396
reference_id CVE-2017-8396
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8396
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8396
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1vd-wk2z-cubz
5
url VCID-dyx7-6xgz-mqa7
vulnerability_id VCID-dyx7-6xgz-mqa7
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9038
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57909
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-12T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.57993
published_at 2026-04-02T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58013
published_at 2026-04-04T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.57988
published_at 2026-04-07T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58043
published_at 2026-04-08T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-09T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58063
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452167
reference_id 1452167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9038
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyx7-6xgz-mqa7
6
url VCID-ehpe-yk86-uyhk
vulnerability_id VCID-ehpe-yk86-uyhk
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9954.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9954
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.6156
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61634
published_at 2026-04-02T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-04T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61635
published_at 2026-04-07T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61683
published_at 2026-04-08T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61698
published_at 2026-04-09T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-11T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61708
published_at 2026-04-12T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-13T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61729
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1469752
reference_id 1469752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1469752
4
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
5
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9954
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehpe-yk86-uyhk
7
url VCID-j2wc-yxrx-4kh6
vulnerability_id VCID-j2wc-yxrx-4kh6
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9040
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.64816
published_at 2026-04-12T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.64702
published_at 2026-04-01T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.64754
published_at 2026-04-02T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.64782
published_at 2026-04-04T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64745
published_at 2026-04-07T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64795
published_at 2026-04-08T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64809
published_at 2026-04-09T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64826
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9040
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452169
reference_id 1452169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452169
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9040
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wc-yxrx-4kh6
8
url VCID-kzqn-frns-jyab
vulnerability_id VCID-kzqn-frns-jyab
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6966
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51154
published_at 2026-04-01T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.5129
published_at 2026-04-16T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51287
published_at 2026-04-11T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51265
published_at 2026-04-12T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51251
published_at 2026-04-13T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51207
published_at 2026-04-02T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51232
published_at 2026-04-04T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51191
published_at 2026-04-07T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51246
published_at 2026-04-08T12:55:00Z
9
value 0.00278
scoring_system epss
scoring_elements 0.51243
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21139
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21139
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435646
reference_id 1435646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435646
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263
reference_id 858263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6966
reference_id CVE-2017-6966
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6966
9
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-6966
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzqn-frns-jyab
9
url VCID-mmsw-nv69-63et
vulnerability_id VCID-mmsw-nv69-63et
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8394.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8394
reference_id
reference_type
scores
0
value 0.00381
scoring_system epss
scoring_elements 0.59412
published_at 2026-04-01T12:55:00Z
1
value 0.00381
scoring_system epss
scoring_elements 0.59559
published_at 2026-04-16T12:55:00Z
2
value 0.00381
scoring_system epss
scoring_elements 0.59541
published_at 2026-04-09T12:55:00Z
3
value 0.00381
scoring_system epss
scoring_elements 0.5956
published_at 2026-04-11T12:55:00Z
4
value 0.00381
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-12T12:55:00Z
5
value 0.00381
scoring_system epss
scoring_elements 0.59525
published_at 2026-04-13T12:55:00Z
6
value 0.00381
scoring_system epss
scoring_elements 0.59485
published_at 2026-04-02T12:55:00Z
7
value 0.00381
scoring_system epss
scoring_elements 0.5951
published_at 2026-04-04T12:55:00Z
8
value 0.00381
scoring_system epss
scoring_elements 0.59478
published_at 2026-04-07T12:55:00Z
9
value 0.00381
scoring_system epss
scoring_elements 0.59528
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21414
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21414
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449546
reference_id 1449546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449546
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8394
reference_id CVE-2017-8394
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8394
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8394
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmsw-nv69-63et
10
url VCID-pf2c-5jjf-nybg
vulnerability_id VCID-pf2c-5jjf-nybg
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8393.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8393
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-01T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59487
published_at 2026-04-16T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59471
published_at 2026-04-09T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.5949
published_at 2026-04-11T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59474
published_at 2026-04-12T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59455
published_at 2026-04-13T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59417
published_at 2026-04-02T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59441
published_at 2026-04-04T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-07T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59458
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21412
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21412
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449542
reference_id 1449542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449542
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8393
reference_id CVE-2017-8393
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8393
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8393
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf2c-5jjf-nybg
11
url VCID-qc15-j65u-pkhe
vulnerability_id VCID-qc15-j65u-pkhe
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8392.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8392
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63198
published_at 2026-04-01T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63285
published_at 2026-04-13T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.6332
published_at 2026-04-09T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-11T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-16T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63257
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-04T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63251
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8392
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21409
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21409
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449540
reference_id 1449540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449540
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8392
reference_id CVE-2017-8392
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8392
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8392
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qc15-j65u-pkhe
12
url VCID-qnnr-5t4r-xfdc
vulnerability_id VCID-qnnr-5t4r-xfdc
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6969
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.6387
published_at 2026-04-16T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63881
published_at 2026-04-11T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63867
published_at 2026-04-12T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63834
published_at 2026-04-13T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63816
published_at 2026-04-02T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63842
published_at 2026-04-04T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63799
published_at 2026-04-07T12:55:00Z
8
value 0.00455
scoring_system epss
scoring_elements 0.6385
published_at 2026-04-08T12:55:00Z
9
value 0.00455
scoring_system epss
scoring_elements 0.63868
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21156
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21156
4
reference_url http://www.securityfocus.com/bid/97065
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97065
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1435648
reference_id 1435648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1435648
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256
reference_id 858256
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256
7
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6969
reference_id CVE-2017-6969
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6969
10
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
11
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-6969
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnnr-5t4r-xfdc
13
url VCID-qv6w-s2tv-eyfs
vulnerability_id VCID-qv6w-s2tv-eyfs
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9039
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57909
published_at 2026-04-01T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58052
published_at 2026-04-16T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58063
published_at 2026-04-11T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58042
published_at 2026-04-12T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-13T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.57993
published_at 2026-04-02T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58013
published_at 2026-04-04T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.57988
published_at 2026-04-07T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58043
published_at 2026-04-08T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9039
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452168
reference_id 1452168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452168
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9039
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv6w-s2tv-eyfs
14
url VCID-uquf-bqkw-4yfc
vulnerability_id VCID-uquf-bqkw-4yfc
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8395.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8395
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64578
published_at 2026-04-01T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.6466
published_at 2026-04-04T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64631
published_at 2026-04-02T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64617
published_at 2026-04-07T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64666
published_at 2026-04-08T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.64681
published_at 2026-04-09T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64698
published_at 2026-04-11T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64686
published_at 2026-04-12T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66176
published_at 2026-04-13T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66212
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21431
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21431
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449548
reference_id 1449548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449548
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8395
reference_id CVE-2017-8395
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8395
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8395
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uquf-bqkw-4yfc
15
url VCID-vebu-dbe7-bkgt
vulnerability_id VCID-vebu-dbe7-bkgt
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8397.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8397
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.6091
published_at 2026-04-01T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.61068
published_at 2026-04-16T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.6104
published_at 2026-04-09T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.61061
published_at 2026-04-11T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.61047
published_at 2026-04-12T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.61027
published_at 2026-04-13T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.60982
published_at 2026-04-02T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61011
published_at 2026-04-04T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.60976
published_at 2026-04-07T12:55:00Z
9
value 0.00405
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21434
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21434
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449552
reference_id 1449552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449552
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8397
reference_id CVE-2017-8397
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8397
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8397
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vebu-dbe7-bkgt
16
url VCID-vs8t-zddw-9fdm
vulnerability_id VCID-vs8t-zddw-9fdm
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8398.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8398
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.6091
published_at 2026-04-01T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.61011
published_at 2026-04-04T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.60982
published_at 2026-04-02T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.60976
published_at 2026-04-07T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-08T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.6104
published_at 2026-04-09T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.61061
published_at 2026-04-11T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61047
published_at 2026-04-12T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62734
published_at 2026-04-13T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.62775
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=21438
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=21438
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1449553
reference_id 1449553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1449553
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8398
reference_id CVE-2017-8398
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8398
8
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
9
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-8398
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vs8t-zddw-9fdm
17
url VCID-vx34-9cr4-tufs
vulnerability_id VCID-vx34-9cr4-tufs
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7614.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7614
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61772
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61946
published_at 2026-04-16T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-09T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61935
published_at 2026-04-11T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61923
published_at 2026-04-12T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61903
published_at 2026-04-13T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61846
published_at 2026-04-02T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61877
published_at 2026-04-04T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61848
published_at 2026-04-07T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61897
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7614
2
reference_url https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1440837
reference_id 1440837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1440837
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859989
reference_id 859989
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859989
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7614
reference_id CVE-2017-7614
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7614
9
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
10
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-7614
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx34-9cr4-tufs
18
url VCID-z7m5-hqbr-abc2
vulnerability_id VCID-z7m5-hqbr-abc2
summary
Multiple vulnerabilities have been found in Binutils, the worst of
    which may allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9042
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60219
published_at 2026-04-01T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60383
published_at 2026-04-16T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60375
published_at 2026-04-11T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60361
published_at 2026-04-12T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60342
published_at 2026-04-13T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60295
published_at 2026-04-02T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.6032
published_at 2026-04-04T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60288
published_at 2026-04-07T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60338
published_at 2026-04-08T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60354
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452173
reference_id 1452173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452173
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
reference_id 863674
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674
6
reference_url https://security.archlinux.org/AVG-276
reference_id AVG-276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-276
7
reference_url https://security.gentoo.org/glsa/201709-02
reference_id GLSA-201709-02
reference_type
scores
url https://security.gentoo.org/glsa/201709-02
8
reference_url https://usn.ubuntu.com/4336-2/
reference_id USN-4336-2
reference_type
scores
url https://usn.ubuntu.com/4336-2/
fixed_packages
0
url pkg:ebuild/sys-devel/binutils@2.28.1
purl pkg:ebuild/sys-devel/binutils@2.28.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1
aliases CVE-2017-9042
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7m5-hqbr-abc2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1