{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","type":"ebuild","namespace":"sys-devel","name":"binutils","version":"2.29.1-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.30-r2","latest_non_vulnerable_version":"2.40","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60872?format=json","vulnerability_id":"VCID-2p9v-kf9t-b7fs","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7224.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7224","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52812","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52971","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52873","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52898","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52923","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52863","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20892","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20892"},{"reference_url":"http://www.securityfocus.com/bid/97277","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97277"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435247","reference_id":"1435247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435247"},{"reference_url":"https://security.archlinux.org/AVG-936","reference_id":"AVG-936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-936"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7224","reference_id":"CVE-2017-7224","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7224"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7224"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2p9v-kf9t-b7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60874?format=json","vulnerability_id":"VCID-325s-kx5s-97dj","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7227.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7227","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63094","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6325","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63303","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6329","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63206","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63207","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20906","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20906"},{"reference_url":"http://www.securityfocus.com/bid/97209","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97209"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435303","reference_id":"1435303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435303"},{"reference_url":"https://security.archlinux.org/AVG-937","reference_id":"AVG-937","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-937"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7227","reference_id":"CVE-2017-7227","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7227"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7227"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-325s-kx5s-97dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60881?format=json","vulnerability_id":"VCID-3n1b-3f2b-gbhz","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9756.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9756","reference_id":"","reference_type":"","scores":[{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79797","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.7964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.7971","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79733","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.7975","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79746","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79759","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469663","reference_id":"1469663","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469663"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42204.txt","reference_id":"CVE-2017-9756","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42204.txt"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21595","reference_id":"CVE-2017-9756","reference_type":"exploit","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21595"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"},{"reference_url":"https://usn.ubuntu.com/4336-3/","reference_id":"USN-4336-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9756"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3n1b-3f2b-gbhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60869?format=json","vulnerability_id":"VCID-4ty8-8ecg-mqdy","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7209.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7209","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54626","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54575","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54561","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54536","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54479","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54522","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21135","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21135"},{"reference_url":"http://www.securityfocus.com/bid/96994","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96994"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435632","reference_id":"1435632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858323","reference_id":"858323","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858323"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7209","reference_id":"CVE-2017-7209","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7209"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty8-8ecg-mqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60879?format=json","vulnerability_id":"VCID-68wn-ck8b-97ht","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9751.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9751","reference_id":"","reference_type":"","scores":[{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469639","reference_id":"1469639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469639"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9751"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68wn-ck8b-97ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60863?format=json","vulnerability_id":"VCID-73mj-sk88-8yeq","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14130.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14130","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6159","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61629","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489067","reference_id":"1489067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489067"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-14130"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73mj-sk88-8yeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60875?format=json","vulnerability_id":"VCID-8v4a-a8qe-rbh6","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9743.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9743","reference_id":"","reference_type":"","scores":[{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80046","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80097","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80094","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.8011","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80151","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469520","reference_id":"1469520","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469520"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9743"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8v4a-a8qe-rbh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60873?format=json","vulnerability_id":"VCID-cttr-nc15-jbb9","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7225.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7225","reference_id":"","reference_type":"","scores":[{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60233","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.6008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60128","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60186","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60144","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60171","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.6254","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.6268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62646","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20891","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20891"},{"reference_url":"http://www.securityfocus.com/bid/97275","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97275"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435287","reference_id":"1435287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435287"},{"reference_url":"https://security.archlinux.org/AVG-936","reference_id":"AVG-936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-936"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7225","reference_id":"CVE-2017-7225","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7225"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7225"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cttr-nc15-jbb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60864?format=json","vulnerability_id":"VCID-h9wj-9muc-73ce","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14333.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14333.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14333","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50095","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50014","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.49994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50024","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50094","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.49958","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14333"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"},{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21990","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21990"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492129","reference_id":"1492129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492129"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14333","reference_id":"CVE-2017-14333","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14333"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-14333"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9wj-9muc-73ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60880?format=json","vulnerability_id":"VCID-hqqj-qtrb-qbdw","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9755.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9755","reference_id":"","reference_type":"","scores":[{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01188","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469657","reference_id":"1469657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469657"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9755"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hqqj-qtrb-qbdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60861?format=json","vulnerability_id":"VCID-jf7a-ern8-c3fk","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14128.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14128","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6159","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61629","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489061","reference_id":"1489061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489061"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-14128"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jf7a-ern8-c3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60876?format=json","vulnerability_id":"VCID-kfqh-w8qa-hkh4","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9746.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9746","reference_id":"","reference_type":"","scores":[{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88849","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88878","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88873","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88883","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.8944","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89471","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469608","reference_id":"1469608","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469608"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42199.txt","reference_id":"CVE-2017-9746","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42199.txt"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21580","reference_id":"CVE-2017-9746","reference_type":"exploit","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21580"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9746"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kfqh-w8qa-hkh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60860?format=json","vulnerability_id":"VCID-kq6q-9zwr-5yav","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12967.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12967","reference_id":"","reference_type":"","scores":[{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77219","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77154","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77171","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.7697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.7702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77093","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77145","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484526","reference_id":"1484526","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1484526"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-12967"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kq6q-9zwr-5yav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60862?format=json","vulnerability_id":"VCID-m1xn-tgqd-6qfm","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14129.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-14129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14129","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6159","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61584","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61629","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489062","reference_id":"1489062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489062"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-14129"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1xn-tgqd-6qfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60865?format=json","vulnerability_id":"VCID-mann-686a-8bec","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15023.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15023.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15023","reference_id":"","reference_type":"","scores":[{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65455","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65712","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65572","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6562","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65665","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65636","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65596","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15023"},{"reference_url":"https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22200","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22200"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf"},{"reference_url":"http://www.securityfocus.com/bid/101611","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101611"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500374","reference_id":"1500374","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1500374"},{"reference_url":"https://security.archlinux.org/AVG-435","reference_id":"AVG-435","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-435"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15023","reference_id":"CVE-2017-15023","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15023"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-15023"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mann-686a-8bec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60870?format=json","vulnerability_id":"VCID-mgmr-bkuv-sbba","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7210.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7210","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54626","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54575","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54561","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54595","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54593","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54536","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54479","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54522","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21157","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21157"},{"reference_url":"http://www.securityfocus.com/bid/96992","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96992"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435634","reference_id":"1435634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435634"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858324","reference_id":"858324","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858324"},{"reference_url":"https://security.archlinux.org/AVG-276","reference_id":"AVG-276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7210","reference_id":"CVE-2017-7210","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7210"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7210"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mgmr-bkuv-sbba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60871?format=json","vulnerability_id":"VCID-qkjb-wje6-gkgr","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7223.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7223","reference_id":"","reference_type":"","scores":[{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59919","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60164","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60115","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60074","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60101","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60021","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60041","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60076","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.6006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60089","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.6005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60056","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20898","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435244","reference_id":"1435244","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1435244"},{"reference_url":"https://security.archlinux.org/AVG-936","reference_id":"AVG-936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-936"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7223","reference_id":"CVE-2017-7223","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7223"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-7223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qkjb-wje6-gkgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60859?format=json","vulnerability_id":"VCID-r3wu-tqn9-syfx","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12799.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12799","reference_id":"","reference_type":"","scores":[{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52057","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51951","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51992","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51952","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51977","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51942","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52047","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52029","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51987","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.519","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:P/A:P"},{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1480342","reference_id":"1480342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1480342"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-12799"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3wu-tqn9-syfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60858?format=json","vulnerability_id":"VCID-sjas-kcud-hfdk","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12456.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12456","reference_id":"","reference_type":"","scores":[{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57383","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57292","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57318","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57322","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57325","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57326","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57237","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57281","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57343","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1483600","reference_id":"1483600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1483600"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-12456"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjas-kcud-hfdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60866?format=json","vulnerability_id":"VCID-u1a5-dhw2-tye7","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15938.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15938","reference_id":"","reference_type":"","scores":[{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.70992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71248","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71204","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71193","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.7102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.70995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71037","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71076","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.7106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00658","scoring_system":"epss","scoring_elements":"0.71166","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15938"},{"reference_url":"https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22209","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22209"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1b86808a86077722ee4f42ff97f836b12420bb2a","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1b86808a86077722ee4f42ff97f836b12420bb2a"},{"reference_url":"http://www.securityfocus.com/bid/101610","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101610"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515721","reference_id":"1515721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515721"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15938","reference_id":"CVE-2017-15938","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15938"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-15938"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1a5-dhw2-tye7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60877?format=json","vulnerability_id":"VCID-u551-dd2z-4fev","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9749.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9749","reference_id":"","reference_type":"","scores":[{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88907","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88873","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88885","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88879","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04256","scoring_system":"epss","scoring_elements":"0.88889","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89471","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.8944","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04778","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04784","scoring_system":"epss","scoring_elements":"0.89471","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469619","reference_id":"1469619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469619"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42201.txt","reference_id":"CVE-2017-9749","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42201.txt"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21586","reference_id":"CVE-2017-9749","reference_type":"exploit","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21586"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9749"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u551-dd2z-4fev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60867?format=json","vulnerability_id":"VCID-wzd5-ddj1-zkgg","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15939.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15939.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15939","reference_id":"","reference_type":"","scores":[{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56354","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56269","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56292","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.5635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56253","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56207","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56256","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56319","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15939"},{"reference_url":"https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22205","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22205"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a54018b72d75abf2e74bf36016702da06399c1d9","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a54018b72d75abf2e74bf36016702da06399c1d9"},{"reference_url":"http://www.securityfocus.com/bid/101613","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101613"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510338","reference_id":"1510338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510338"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15939","reference_id":"CVE-2017-15939","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15939"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-15939"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzd5-ddj1-zkgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60868?format=json","vulnerability_id":"VCID-yqbv-z58c-dycr","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15996.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15996","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54475","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54633","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54528","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54541","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54567","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.546","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54486","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22361","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22361"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b"},{"reference_url":"http://www.securityfocus.com/bid/101608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515742","reference_id":"1515742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515742"},{"reference_url":"https://security.archlinux.org/AVG-435","reference_id":"AVG-435","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-435"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15996","reference_id":"CVE-2017-15996","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15996"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-15996"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqbv-z58c-dycr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60878?format=json","vulnerability_id":"VCID-zem4-esw9-c3ef","summary":"Multiple vulnerabilities have been found in Binutils, the worst of\n    which may allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9750.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9750","reference_id":"","reference_type":"","scores":[{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85181","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85049","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85117","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85138","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85134","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02391","scoring_system":"epss","scoring_elements":"0.85148","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02696","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469635","reference_id":"1469635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469635"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42198.txt","reference_id":"CVE-2017-9750","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42198.txt"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21587","reference_id":"CVE-2017-9750","reference_type":"exploit","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=21587"},{"reference_url":"https://security.gentoo.org/glsa/201801-01","reference_id":"GLSA-201801-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201801-01"},{"reference_url":"https://usn.ubuntu.com/4336-2/","reference_id":"USN-4336-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-2/"},{"reference_url":"https://usn.ubuntu.com/4336-3/","reference_id":"USN-4336-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4336-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85485?format=json","purl":"pkg:ebuild/sys-devel/binutils@2.29.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}],"aliases":["CVE-2017-9750"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zem4-esw9-c3ef"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-devel/binutils@2.29.1-r1"}