Lookup for vulnerable packages by Package URL.

GET /api/packages/84297?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
    "type": "ebuild",
    "namespace": "sys-devel",
    "name": "binutils",
    "version": "2.32-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.33.1",
    "latest_non_vulnerable_version": "2.40",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58586?format=api",
            "vulnerability_id": "VCID-223y-wj7c-7kg9",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13033.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13033.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-13033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80902",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8096",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80997",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80998",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80933",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80958",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80966",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80982",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80968",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-13033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23361"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104584"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597436",
                    "reference_id": "1597436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597436"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13033",
                    "reference_id": "CVE-2018-13033",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13033"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032",
                    "reference_id": "RHSA-2018:3032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-13033"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-223y-wj7c-7kg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58588?format=api",
            "vulnerability_id": "VCID-24yc-9zfd-skax",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19932.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61829",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61986",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62005",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61902",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61979",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61958",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19932"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949",
                    "reference_id": "1658949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658949"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-19932"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58582?format=api",
            "vulnerability_id": "VCID-42yc-u5rt-tua5",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81416",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8152",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81445",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81478",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.815",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81487",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12697"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104538"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417",
                    "reference_id": "1595417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595417"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
                    "reference_id": "CVE-2018-12697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075",
                    "reference_id": "RHSA-2019:2075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2075"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-12697"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42yc-u5rt-tua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58577?format=api",
            "vulnerability_id": "VCID-4wrr-kvzv-9kh9",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62114",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6208",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62124",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6213",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62025",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62056",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62075",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62092",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62112",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62101",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23064",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23064"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/103976"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573356",
                    "reference_id": "1573356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573356"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10372",
                    "reference_id": "CVE-2018-10372",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10372"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032",
                    "reference_id": "RHSA-2018:3032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-10372"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wrr-kvzv-9kh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58581?format=api",
            "vulnerability_id": "VCID-8me4-hzeq-tbfn",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72331",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72416",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72377",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72419",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72428",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72336",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72332",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72371",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72383",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72406",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7239",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12641"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763099"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85452"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23058"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410",
                    "reference_id": "1594410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594410"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
                    "reference_id": "CVE-2018-12641",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2075",
                    "reference_id": "RHSA-2019:2075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2075"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-12641"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8me4-hzeq-tbfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58585?format=api",
            "vulnerability_id": "VCID-dwjp-m9fc-nkak",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12700",
                    "reference_id": "CVE-2018-12700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12700"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-12700"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwjp-m9fc-nkak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58583?format=api",
            "vulnerability_id": "VCID-e98q-uqeq-g7ef",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12698.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83128",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83182",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83195",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83231",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83232",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83189",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01892",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83205",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83861",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12698"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104539"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419",
                    "reference_id": "1595419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595419"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698",
                    "reference_id": "CVE-2018-12698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4326-1/",
                    "reference_id": "USN-4326-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4326-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-12698"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e98q-uqeq-g7ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58580?format=api",
            "vulnerability_id": "VCID-esxz-zyg7-37d6",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35027",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35127",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35175",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35151",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35189",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35255",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35136",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3518",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35206",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3521",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23113"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104021"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574697",
                    "reference_id": "1574697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574697"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10535",
                    "reference_id": "CVE-2018-10535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10535"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032",
                    "reference_id": "RHSA-2018:3032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-10535"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-esxz-zyg7-37d6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58578?format=api",
            "vulnerability_id": "VCID-fvgn-6bb7-tucb",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10373.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10373.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77685",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77773",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77744",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77781",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7778",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77719",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7773",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77735",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77761",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77745",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10373"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23065"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573365",
                    "reference_id": "1573365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573365"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10373",
                    "reference_id": "CVE-2018-10373",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10373"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032",
                    "reference_id": "RHSA-2018:3032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-10373"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvgn-6bb7-tucb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58584?format=api",
            "vulnerability_id": "VCID-g97f-4w1h-uud8",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66669",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66772",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67813",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67826",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67777",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69165",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12699"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23057"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104540"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427",
                    "reference_id": "1595427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595427"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
                    "reference_id": "CVE-2018-12699",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9689",
                    "reference_id": "RHSA-2024:9689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9689"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-12699"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g97f-4w1h-uud8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58587?format=api",
            "vulnerability_id": "VCID-kuzy-t7d8-kfhd",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19931.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55027",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55173",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5519",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55194",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55152",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55177",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55188",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55169",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55151",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19931"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947",
                    "reference_id": "1658947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658947"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-19931"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58591?format=api",
            "vulnerability_id": "VCID-sq8n-whxy-qkb2",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20651.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73278",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73372",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73371",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73379",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73311",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73332",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73356",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73336",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20651"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24041"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K38336243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K38336243"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106440"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703",
                    "reference_id": "1664703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664703"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651",
                    "reference_id": "CVE-2018-20651",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20651"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-20651"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq8n-whxy-qkb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58579?format=api",
            "vulnerability_id": "VCID-vpe3-uep6-7bbx",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10534.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10534.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39315",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3938",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39431",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39402",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64526",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64484",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64548",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64563",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64551",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64442",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23110"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104025"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574696",
                    "reference_id": "1574696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574696"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10534",
                    "reference_id": "CVE-2018-10534",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10534"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3032",
                    "reference_id": "RHSA-2018:3032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-10534"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpe3-uep6-7bbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58589?format=api",
            "vulnerability_id": "VCID-w17q-m7sf-23fx",
            "summary": "Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54537",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54598",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54645",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00315",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5464",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55996",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55971",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55957",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55994",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534",
                    "reference_id": "1661534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661534"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201906-3",
                    "reference_id": "ASA-201906-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201906-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-832",
                    "reference_id": "AVG-832",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-832"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-01",
                    "reference_id": "GLSA-201908-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-1/",
                    "reference_id": "USN-4336-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4336-2/",
                    "reference_id": "USN-4336-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4336-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84297?format=api",
                    "purl": "pkg:ebuild/sys-devel/binutils@2.32-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
                }
            ],
            "aliases": [
                "CVE-2018-20002"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.32-r1"
}