{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","type":"ebuild","namespace":"sys-devel","name":"binutils","version":"2.28.1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.29.1-r1","latest_non_vulnerable_version":"2.40","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50177?format=json","vulnerability_id":"VCID-1rp7-5hxs-tqbx","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6965","reference_id":"","reference_type":"","scores":[{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.4865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48672","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52631","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52543","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52621","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52513","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52509","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21137","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21137"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435640","reference_id":"1435640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435640"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264","reference_id":"858264","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858264"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6965","reference_id":"CVE-2017-6965","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6965"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-6965"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rp7-5hxs-tqbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50189?format=json","vulnerability_id":"VCID-2mve-frvh-9uf1","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8421.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8421","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24819","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24692","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2471","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25031","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2496","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2488","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24893","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24808","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24766","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21440","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449555","reference_id":"1449555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449555"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8421","reference_id":"CVE-2017-8421","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8421"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"},{"reference_url":"https://usn.ubuntu.com/6413-1/","reference_id":"USN-6413-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6413-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8421"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2mve-frvh-9uf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50193?format=json","vulnerability_id":"VCID-5cxe-ara7-jfcr","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9041","reference_id":"","reference_type":"","scores":[{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.6513","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65392","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65304","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65326","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65382","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.6518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65221","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65246","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65253","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65266","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.6529","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65336","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452171","reference_id":"1452171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452171"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674","reference_id":"863674","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9041"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cxe-ara7-jfcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50195?format=json","vulnerability_id":"VCID-7cp4-dcw6-1bgb","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9742.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9742.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9742","reference_id":"","reference_type":"","scores":[{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82673","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82545","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.8255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.8257","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.8259","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82609","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82625","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82666","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01735","scoring_system":"epss","scoring_elements":"0.82508","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01959","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469284","reference_id":"1469284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469284"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42203.txt","reference_id":"CVE-2017-9742","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42203.txt"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21576","reference_id":"CVE-2017-9742","reference_type":"exploit","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21576"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"},{"reference_url":"https://usn.ubuntu.com/4336-3/","reference_id":"USN-4336-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9742"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cp4-dcw6-1bgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50186?format=json","vulnerability_id":"VCID-d1vd-wk2z-cubz","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8396.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8396","reference_id":"","reference_type":"","scores":[{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59587","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5948","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59507","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59578","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59471","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59464","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59522","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21432","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21432"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449550","reference_id":"1449550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449550"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8396","reference_id":"CVE-2017-8396","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8396"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8396"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1vd-wk2z-cubz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50190?format=json","vulnerability_id":"VCID-dyx7-6xgz-mqa7","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9038","reference_id":"","reference_type":"","scores":[{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57909","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58116","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58032","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58102","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58046","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58052","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57992","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58053","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58004","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452167","reference_id":"1452167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452167"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674","reference_id":"863674","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9038"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyx7-6xgz-mqa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50196?format=json","vulnerability_id":"VCID-ehpe-yk86-uyhk","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9954.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9954","reference_id":"","reference_type":"","scores":[{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61634","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61635","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61689","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61729","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61735","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61711","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61721","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61776","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61732","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61761","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61815","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6183","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469752","reference_id":"1469752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469752"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9954"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ehpe-yk86-uyhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50192?format=json","vulnerability_id":"VCID-j2wc-yxrx-4kh6","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9040","reference_id":"","reference_type":"","scores":[{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58116","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58052","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57992","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58053","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58032","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58102","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64754","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64795","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452169","reference_id":"1452169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452169"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674","reference_id":"863674","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9040"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wc-yxrx-4kh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50178?format=json","vulnerability_id":"VCID-kzqn-frns-jyab","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6966","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51304","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51186","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51216","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51293","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51297","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51187","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51229","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21139","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435646","reference_id":"1435646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263","reference_id":"858263","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858263"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6966","reference_id":"CVE-2017-6966","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6966"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-6966"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzqn-frns-jyab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50184?format=json","vulnerability_id":"VCID-mmsw-nv69-63et","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8394.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8394","reference_id":"","reference_type":"","scores":[{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59659","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59595","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59553","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59581","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59651","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.5951","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.5956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.5952","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.5954","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59537","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21414","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21414"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449546","reference_id":"1449546","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449546"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8394","reference_id":"CVE-2017-8394","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8394"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8394"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmsw-nv69-63et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50183?format=json","vulnerability_id":"VCID-pf2c-5jjf-nybg","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8393.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8393","reference_id":"","reference_type":"","scores":[{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59587","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59522","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5948","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59507","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59578","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59471","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59464","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21412","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449542","reference_id":"1449542","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449542"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8393","reference_id":"CVE-2017-8393","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8393"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8393"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pf2c-5jjf-nybg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50181?format=json","vulnerability_id":"VCID-qc15-j65u-pkhe","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8392.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8392","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63459","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63407","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63395","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63303","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63327","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6331","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63355","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21409","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21409"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449540","reference_id":"1449540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449540"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8392","reference_id":"CVE-2017-8392","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8392"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8392"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qc15-j65u-pkhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50179?format=json","vulnerability_id":"VCID-qnnr-5t4r-xfdc","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6969","reference_id":"","reference_type":"","scores":[{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.64011","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63925","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63951","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63868","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63894","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63866","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63957","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21156","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21156"},{"reference_url":"http://www.securityfocus.com/bid/97065","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97065"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435648","reference_id":"1435648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435648"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256","reference_id":"858256","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858256"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6969","reference_id":"CVE-2017-6969","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6969"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-6969"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnnr-5t4r-xfdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50191?format=json","vulnerability_id":"VCID-qv6w-s2tv-eyfs","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9039","reference_id":"","reference_type":"","scores":[{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57909","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58116","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58032","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58102","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58046","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58052","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57992","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58053","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452168","reference_id":"1452168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452168"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674","reference_id":"863674","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9039"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv6w-s2tv-eyfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50185?format=json","vulnerability_id":"VCID-uquf-bqkw-4yfc","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8395.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8395","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64578","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64686","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6466","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64681","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66285","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66363","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66373","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66271","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66305","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66212","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66226","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66248","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21431","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21431"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449548","reference_id":"1449548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449548"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8395","reference_id":"CVE-2017-8395","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8395"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8395"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uquf-bqkw-4yfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50187?format=json","vulnerability_id":"VCID-vebu-dbe7-bkgt","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8397.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8397","reference_id":"","reference_type":"","scores":[{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61172","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61052","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61111","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.611","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61157","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61047","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61027","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61074","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61059","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6106","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61002","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21434","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21434"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449552","reference_id":"1449552","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449552"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8397","reference_id":"CVE-2017-8397","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8397"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8397"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vebu-dbe7-bkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50188?format=json","vulnerability_id":"VCID-vs8t-zddw-9fdm","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8398.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8398.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8398","reference_id":"","reference_type":"","scores":[{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61047","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68603","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68594","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68649","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.6866","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68523","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68565","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68569","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21438","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449553","reference_id":"1449553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1449553"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8398","reference_id":"CVE-2017-8398","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8398"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-8398"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vs8t-zddw-9fdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50180?format=json","vulnerability_id":"VCID-vx34-9cr4-tufs","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7614.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7614","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61772","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62041","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61931","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61992","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61973","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62026","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61946","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61938","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61884","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7614"},{"reference_url":"https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1440837","reference_id":"1440837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1440837"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859989","reference_id":"859989","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859989"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7614","reference_id":"CVE-2017-7614","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7614"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-7614"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vx34-9cr4-tufs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50194?format=json","vulnerability_id":"VCID-z7m5-hqbr-abc2","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9042","reference_id":"","reference_type":"","scores":[{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60478","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.6038","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60407","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60467","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.6032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60361","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60359","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60364","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60423","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452173","reference_id":"1452173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452173"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674","reference_id":"863674","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863674"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://security.gentoo.org/glsa/201709-02","reference_id":"GLSA-201709-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-02"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78158?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.28.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}],"aliases":["CVE-2017-9042"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7m5-hqbr-abc2"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.28.1"}